article thumbnail

5 Cloud Trends That Will Reshape IT in 2021

DXC

We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage.

Cloud 110
article thumbnail

Steps to Strengthen Cloud Security

Data Breach Today

Troy Leach on Cloud Security Skills, Challenges and Trends "If we look at all of the types of issues with cloud breaches, it always comes down to misconfiguration," says Troy Leach of Cloud Security Alliance.

Cloud 158
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Services cloud managed services Professional Services Migrate to the cloud

Cloud 74
article thumbnail

Chinese Group Targeting Vulnerable Cloud Providers, Applications

Data Breach Today

Crypto Mining Campaign Targets Public Cloud Environments, Increases Security Risks Cybersecurity researchers say a Chinese for-profit threat group tracked as 8220 Gang is targeting cloud providers and poorly secured applications with a custom-built crypto miner and IRC bot.

Mining 151
article thumbnail

Top Considerations for Building an Open Cloud Data Lake

In this paper, we explore the top considerations for building a cloud data lake including architectural principles, when to use cloud data lake engines and how to empower non-technical users.

article thumbnail

Is Cloud Storage Secure?

Record Nations

Cloud storage refers to a storage system for data saved on remote servers rather than on your computer. Saving data to the cloud makes it accessible from any location and easier to find with quick search capabilities. The post Is Cloud Storage Secure?

Cloud 52
article thumbnail

Visibility Into Distributed Cloud Environments

Data Breach Today

He discusses cloud governance, digital transformation and identities, and the importance of transparency in automation

Cloud 201
article thumbnail

Building Resilience in a Multi-Cloud Environment

Data Breach Today

Lee Newcombe of Capgemini on Reducing Complexity in the Cloud A well-managed multi-cloud strategy "is a sensible approach" because it allows organizations to move different workloads between providers, but it gets a "bit more complicated when you start thinking about workload portability," says Lee Newcombe, security director, Capgemini U.K.

Cloud 200
article thumbnail

Hybrid Cloud Changes the Game for Security

Data Breach Today

Cloud 207
article thumbnail

Demystifying cloud migration

OpenText Information Management

The business world is repeatedly proving that cloud is fast, reliable, scalable and­ cost-effective. When it comes to greenfield cloud deployments, the business case for deploying in the cloud is strong and compelling.

Cloud 74
article thumbnail

Ultimate Guide to the Cloud Data Lake Engine

This guide describes how to evaluate cloud data lake engine offerings based on their ability to deliver on their promise of improving performance, data accessibility, and operational efficiency as compared with earlier methods of querying the data lake.

article thumbnail

Safeguarding the Enterprise Across Multiple Public Clouds

Data Breach Today

Microsoft's Abbas Kudrati and HCL's Upendra Singh on Zero Trust and Cloud Security Organizations have created significant security challenges by rapidly migrating applications, data and workloads to multiple public clouds over the course of the COVID-19 pandemic, according to Abbas Kudrati of Microsoft and Upendra Singh of HCL.

Cloud 207
article thumbnail

Governance in the Cloud Shifts Left

Dark Reading

CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments

article thumbnail

Why Businesses Are Switching to the Cloud

Record Nations

Cloud technology gives you instant access to your files, heightened security, and more control over your data. Businesses of all sizes can benefit from cloud services, which is why nearly 94% of all enterprises use cloud […]. Cloud Storage cloud cloud storage

Cloud 57
article thumbnail

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 201
article thumbnail

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

article thumbnail

The 6 R’s – Strategies for cloud migration

OpenText Information Management

The journey to the cloud is different for every organization as there is no one-size-fits-all migration plan. Each IT asset to be migrated is unique in terms of cost, performance, and complexity, so you cannot move all components to the cloud with one common method.

Cloud 59
article thumbnail

Banking on Cloud Security

Data Breach Today

These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says "Better, cheaper, faster."

Cloud 181
article thumbnail

Cloud Security: The Shared Responsibility Model

eSecurity Planet

Cloud security builds off of the same IT infrastructure and security stack principles of a local data center. However, a cloud vendor offering provides a pre-packaged solution that absorbs some operational and security responsibilities from the customer.

Cloud 85
article thumbnail

CrowdStrike's Michael Sentonas on Identity, Cloud and XDR

Data Breach Today

Identity, observability, log management and cloud security have been CrowdStrike's biggest areas of investment during 2022, says CTO Michael Sentonas.

Cloud 228
article thumbnail

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

article thumbnail

Risk Disconnect in the Cloud

Dark Reading

New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads

Risk 105
article thumbnail

Sysdig CEO on How Open Source Fuels Cloud, Container Defense

Data Breach Today

Suresh Vasudevan on Why Falco Has Become the Industry Standard for Threat Detection Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig's Falco open-source threat detection engine to secure their environments.

Cloud 182
article thumbnail

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? News & Events Cloud & Applications OpenText Cloud Cloud Summit information matters cloud event cloud assessment free event cloud readiness

Cloud 79
article thumbnail

Feds Urge Healthcare Entities to Address Cloud Security

Data Breach Today

Advisory Comes in Midst of Recent Cyber Incidents Involving Cloud Providers With healthcare sector entities increasingly transitioning to cloud-based applications, storage and various other third-party hosted services, they must be proactive in addressing a list of associated security risks, U.S.

Cloud 213
article thumbnail

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

article thumbnail

Europe invests in cloud computing, yet compliance is a barrier

OpenText Information Management

Many EU government agencies have invested substantially in cloud computing initiatives to boost the adoption of cloud solutions. The Europe Cloud Computing Market?

article thumbnail

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 163
article thumbnail

Automated Monitoring in the Cloud

Data Breach Today

Glen Hymers of Save The Children International on Implementing a Cloud-First Approach Glen Hymers, CISO and head of data protection at the U.K.-based

Cloud 198
article thumbnail

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 159
article thumbnail

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

article thumbnail

3 Ways Attackers Bypass Cloud Security

Dark Reading

At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud

Cloud 104
article thumbnail

Grow Faster with OpenText Cloud Edition 21.1

OpenText Information Management

The launch of OpenText™ Cloud Edition (CE) 21.1 includes new features, products, cloud services and solutions to empower modern work, engage customers, connect global commerce and protect data. OpenText Content Cloud CE 21.1? Security & Protection Cloud modern work

Cloud 87
article thumbnail

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 198
article thumbnail

New MagicWeb AD Exploit Shows Value of Cloud, Zero Trust

Data Breach Today

Cloud 216
article thumbnail

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

article thumbnail

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation.

article thumbnail

Atlassian Vulnerabilities Highlight Criticality of Cloud Services

Dark Reading

Two flaws in the popular developer cloud platform show how weaknesses in authorization functions and SaaS flaws can put cloud apps at risk

Cloud 105
article thumbnail

What’s new in OpenText Developer Cloud

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes exciting updates to the OpenText™ Developer Cloud. June 2022: What’s new in the OpenText Developer Cloud 22.2 Cloud Developers Products API CE 22.2 Developer Developer Cloud Developer Cloud CE 22.2

Cloud 68
article thumbnail

TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud

Data Breach Today

Group Uses Compromised Credentials to Attack Cloud Providers, Researchers Say Cryptojacking group TeamTNT is leveraging compromised Amazon Web Services credentials to attack its cloud environments through the platform’s API, according to researchers from Unit 42 at Palo Alto Networks

Cloud 247
article thumbnail

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.