Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 163

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 185

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 201

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? News & Events Cloud & Applications OpenText Cloud Cloud Summit information matters cloud event cloud assessment free event cloud readiness

Cloud 70

Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. However, in such setups the content that gets promoted through the client’s domain is actually hosted on the cloud CRM provider’s systems.

Cloud 280

Assessing the Human Element in Cloud Access

Data Breach Today

Markku Rossi Discusses Shifting to Zero Standing Privileges Cloud security demands robust access management. Markku Rossi of SSH Communications Security discusses zero standing privileges and cloud access

Access 163

Cloud Protection: How to Secure Server Environments

Data Breach Today

Cloud 205

Migrating Workloads to the Cloud with IBM Cloud Paks

Perficient Data & Analytics

This is the first in our series on IBM Cloud Paks. According to a study by McKinsey & Company , IT teams are migrating the simplest workloads to the cloud, but about 80% of workloads are still on-premises. IBM Cloud Pak features. Five types of IBM Cloud Paks.

Cloud 60

Architectural considerations when moving to the cloud

OpenText Information Management

Everyone is talking about moving to the cloud – cost savings, higher reliability, flexible performance options, speedier deployments. Many customers are still agonizing over the decision to move to the cloud out of concern for the safety and security of their data.

Cloud 59

Why The Cloud Is The New Network

Data Breach Today

Fleming Shi of Barracuda Networks on Latest Cloud Security Research Findings Barracuda Networks has released the findings of its latest survey on public cloud security.

Cloud 163

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 156

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication. Security Tools cloud solution provider Microsoft Office 365 multi-factor authentication PCM breach

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference.

Cloud 153

Cloud Security: Overcoming Roadblocks

Data Breach Today

While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration

Cloud 109

Building Security Into Cloud Migration

Data Breach Today

Microsoft's Terence Gomes on Cloud Security and Some Misconceptions It's essential that security be built into cloud migrations and not handled as an afterthought, says Terence Gomes of Microsoft

Cloud 141

Developing a Cloud Adoption Strategy in Healthcare

Perficient Data & Analytics

My last blog discusses how cloud is the leading platform for innovation and agility. In my last blog of this series, I examine how to develop a cloud adoption strategy and best practices. Cloud is an investment in efficiency and focus. Perficient + Healthcare Cloud.

Cloud 63

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises.

Cloud 239

Preparing for Security in Cloud 3.0

Data Breach Today

Attorney Lisa Lifshitz on Addressing Legal, Regulatory Concerns She wrote the book on Cloud 3.0, and now attorney Lisa Lifshitz shares insights on key considerations for choosing cloud providers, as well as how to ensure compliance with emerging regulations

Cloud 185

Own Your Cloud Security

Thales eSecurity

As part of their digital transformation process, more and more businesses are moving to the cloud. Many companies think that by moving your data to the cloud, the service provider will be responsible for the security of your data. Let us examine the typical cloud provider model.

Cloud 120

Cloud Security: How the Dialogue Has Shifted

Data Breach Today

Palo Alto Network's Matt Chiodi on the Evolution of Public Cloud Security In just five years' time, the public cloud security conversation has changed dramatically, says Matt Chiodi of Palo Alto Networks.

Cloud 230

Unpacking the Google Cloud announcement

OpenText Information Management

At Enterprise World 2019 in Toronto, our CEO and CTO Mark Barrenechea announced OpenText’s expanded strategic partnership with Google Cloud. The announcement marks a major inflection point in the evolution of our cloud business at OpenText™ and solidifies our relationship with Google.

Cloud 82

Deception Technology in the Cloud Era

Data Breach Today

Don Gray of PacketViper Describes Evolution of the Technology Deception technology is evolving to help address cloud-based cyberthreats, says Don Gray of PacketViper, who describes the latest changes

Cloud 180

Open Cloud Database Exposes 200 Million Americans

Security Affairs

in a Google Cloud database. . Many people are now so accustomed to cloud computing that they use it multiple times per day, whether to collaborate with co-workers, log into email accounts or do other everyday tasks. However, cloud computing security often gets overlooked.

Cloud 90

5 key things to consider when migrating to the cloud

OpenText Information Management

Cloud computing is now touching all aspects of information technology, and document and data archiving is no exception. When it comes to security, cost savings, reliable services and scalability, there is no bigger advantage than storing your most valuable assets in the cloud.

Cloud 62

Skimming Campaign Leveraged Heroku Cloud Platform: Report

Data Breach Today

Malwarebytes: Platform Used to Host Card Skimmer Infrastructure, Payment Data Several e-commerce sites were targeted with a card skimming campaign that used the Salesforce-owned Heroku cloud platform to host skimmer infrastructure and stolen credit card data, according to a new report from the security firm Malwarebytes.

Cloud 164

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

Krebs on Security

Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days. based iNSYNQ specializes in providing cloud-based QuickBooks accounting software and services.

44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig

Threatpost

Breach Cloud Security Mobile Security Privacy Web Security Amazon Web Services AWS cloud bucket Cloud misconfiguration credit cards Cyberattacks digital wallet exposed database Identity theft key ring loyalty cards medical marijuana cards Phishing PII S3

Cloud 78

Put Those Cloud Security Objections to Rest

Data Breach Today

In the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers

Cloud 176

Cloud Governance Wars - Box vs Office 365

Gimmal

A war has been brewing over the ability to govern content in the cloud. Both vendors have been ramping up their governance and compliance capabilities over the past several years and have launched major initiatives into the world of cloud - based information governance.

Report: Cloud Hopper Attacks Affected More MSPs

Data Breach Today

But a Wall Street Journal investigation on Monday has revealed new companies affected by Cloud Hopper attacks

Cloud 151

Cloud Security: Mess It Up and It's on You

Data Breach Today

Jay Heiser of Gartner Says the Cloud Demands New Security Processes, Tools The transition to cloud-based software and infrastructure has revolutionized development and services. Jay Heiser of Gartner says if organizations don't get cloud security right, it's their own fault.

IT 198

Cloud Misconfig Mistakes Show Need For DevSecOps

Threatpost

Unit 42 researchers discuss public cloud misconfiguration issues that are leading to breaches of sensitive data.

Cloud 63

Cloud Security: Beyond CASB

Data Breach Today

Oracle's Amit Zavery on Taking a Comprehensive Approach Cloud access security brokers are not a panacea for all cloud security problems, says Oracle's Amit Zavery, who advocates an end-to-end approach

Cloud 130

Seeing patterns in the clouds

OpenText Information Management

Recently I had an opportunity to sit down with one of our customers – a large multi-national bank – to talk about their cloud journey in Enterprise Information Management. Cloud cloud Managed Service OpenText Cloud private cloud

Cloud 64

Do You Know What Cloud Assets You Actually Have?

Data Breach Today

Sam Curcuruto of Expanse on the Role of Cloud Governance in Maintaining Control Many organizations struggle to understand what cloud assets they actually have. Sam Curcuruto of Expanse explains the role cloud governance plays in gaining better clarity and control

Cloud 185

Going ‘cloud first’? Start with an easy win: Cloud fax

OpenText Information Management

Have you adopted a ‘cloud first’ strategy where you look to the cloud before an on-premises alternative? There are many benefits to transitioning your applications to a cloud service provider. There are even more when … The post Going ‘cloud first’?

Cloud 60

Cloud Promotes Innovation and Agility in Healthcare

Perficient Data & Analytics

Previously , I examined how cloud provides efficient access to your data. This blog outlines cloud as the leading platform for innovation and agility. Cloud technologies help transform data into health breakthroughs through better care and more streamlined operations.

Cloud 56

Solving the Cloud Data Security Conundrum

Dark Reading

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud

Things to consider before spending on multi-cloud

DXC Technology

The concept of multi-cloud is simple. You’re running multiple business processes using more than one cloud. This isn’t the same thing as hybrid cloud. With that model, you’re coordinating business processes across multiple clouds. Cloud Platform Uncategorized hybrid cloud multi-cloudSo, for example, if your office program is Office 365, but you’re running line of business programs on Amazon Web Services, […].

Cloud 68