5 Cloud Trends That Will Reshape IT in 2021

DXC

We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage.

Cloud 109

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Services cloud managed services Professional Services Migrate to the cloud

Cloud 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Demystifying cloud migration

OpenText Information Management

The business world is repeatedly proving that cloud is fast, reliable, scalable and­ cost-effective. When it comes to greenfield cloud deployments, the business case for deploying in the cloud is strong and compelling.

Cloud 74

Cloud Adoption Widens the Cybersecurity Skills Gap

Dark Reading

No matter what cloud services you employ, you are still responsible for protecting the security of your data

Cloud 114

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 196

Microsoft Cloud for Manufacturing

Ascent Innovations

Microsoft Cloud for Manufacturing. Microsoft Cloud for Manufacturing is Microsoft’s new industry-specific cloud-based solution for Manufacturers. These Industry Clouds draw on Microsoft’s portfolio in combination with partner solutions, to address the needs of each industry.

How I Got Pwned by My Cloud Costs

Troy Hunt

One such talk was How I Pwned My Cloud Costs so it seems apt that today, I write about the exact opposite: how my cloud costs pwned me. However, just as I told earlier stories of how cost-effective the cloud can be, this one about how badly it can bite you deserved to be told.

Cloud 114

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? News & Events Cloud & Applications OpenText Cloud Cloud Summit information matters cloud event cloud assessment free event cloud readiness

Cloud 79

Grow Faster with OpenText Cloud Edition 21.1

OpenText Information Management

The launch of OpenText™ Cloud Edition (CE) 21.1 includes new features, products, cloud services and solutions to empower modern work, engage customers, connect global commerce and protect data. OpenText Content Cloud CE 21.1? Security & Protection Cloud modern work

Cloud 87

Monitoring AWS Container Environments at Scale

In this eBook, learn how to monitor AWS container environments at scale with Datadog and which key metrics to monitor when leveraging two container orchestration systems (ECS and EKS).

TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud

Data Breach Today

Group Uses Compromised Credentials to Attack Cloud Providers, Researchers Say Cryptojacking group TeamTNT is leveraging compromised Amazon Web Services credentials to attack its cloud environments through the platform’s API, according to researchers from Unit 42 at Palo Alto Networks

Cloud 238

Threat actors abuse public cloud services to spread multiple RATs

Security Affairs

Threat actors are actively abusing cloud services from Amazon and Microsoft to deliver RATs such as Nanocore , Netwire , and AsyncRAT. “Organizations should be inspecting outgoing connections to cloud computing services for malicious traffic.

Cloud 109

Trend Micro: Linux Malware Targets Huawei Cloud

Data Breach Today

Code Deployed Prevents Detection and Kills Competition Researchers at Trend Micro have discovered threat actors deploying malicious code that targets Huawei Cloud and removes defensive applications and services.

Cloud 184

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 151

Ultimate Guide to the Cloud Data Lake Engine

This guide describes how to evaluate cloud data lake engine offerings based on their ability to deliver on their promise of improving performance, data accessibility, and operational efficiency as compared with earlier methods of querying the data lake.

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 152

Cloud misconfiguration, a major risk for cloud security

Security Affairs

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Cloud misconfiguration remains the top cause of data breaches in the cloud, and the ongoing COVID-19 pandemic is is exacerbating the situation.

Cloud 94

Cloud hosting provider Swiss Cloud suffered a ransomware attack

Security Affairs

Swiss cloud hosting provider Swiss Cloud has suffered a ransomware attack that seriously impacted its server infrastructure. On April 27 the Swiss cloud hosting provider was hit by a ransomware attack that brought down the company’s server infrastructure.

Cloud 112

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation.

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

Cloud Apps Replace Web as Source for Most Malware Downloads

Dark Reading

Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows

Cloud 110

Mastering the Art of Cloud Tagging Using Data Science

Dark Reading

Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale

4 Considerations for Improving Cloud Security Hygiene

Dark Reading

Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that

Cloud 111

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 179

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

Not So Fastly: Global Outage Highlights Cloud Challenges

Data Breach Today

Without Resiliency Plans, Cloud Infrastructure Can Become Single Point of Failure Content delivery network Fastly says its global outage on Tuesday was caused by an unanticipated software bug, which it has now patched.

Cloud 231

Want the full benefits of cloud? Rethink the journey.

DXC

There’s no denying that companies have realized many benefits from using public clouds – hyperscalability, faster deployment and, perhaps most importantly, flexible operating costs. But when it comes to public cloud migration, […]. The post Want the full benefits of cloud?

Cloud 70

Chart: Cloud Concerns

Dark Reading

As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride

Cloud 107

Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security

Dark Reading

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle

Cloud 100

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

The big challenges in wide-scale government cloud adoption

OpenText Information Management

While public clouds offer a breadth of benefits such as cost savings, scalability, and flexibility, many government entities are hesitant to make the leap. Cloud Extended ECM AppWorks Platform Public cloud

Cloud 87

Automated Monitoring in the Cloud

Data Breach Today

Glen Hymers of Save The Children International on Implementing a Cloud-First Approach Glen Hymers, CISO and head of data protection at the U.K.-based

Cloud 155

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

Threatpost

Malicious groups disable features in Alibaba Cloud ECS instances for Monero cryptojacking, according to Trend Micro researchers. Cloud Security Cryptography Malware Web Security

Cloud 107

Enterprises Worry About Increased Data Risk in Cloud

Dark Reading

The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems

Risk 105

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Cloud 216

The Overlooked Security Risks of The Cloud

Threatpost

Nate Warfield, CTO of Prevaliion, discusses the top security concerns for those embracing virtual machines, public cloud storage and cloud strategies for remote working. Cloud Security InfoSec Insider

Cloud 114

Cloud Data Security Startup Launches

Dark Reading

TrustLogix aims to streamline and simplify data governance in the cloud

Cloud 84

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 212

Product Transformation: Adapting Your Solutions for Cloud Models

Speaker: Ahmad Jubran, Cloud Product Innovation Consultant

In order to maintain a competitive advantage, CTOs and product managers are shifting their products to the cloud. Many do this by simply replicating their current architectures in the cloud. Those previous architectures, which were optimized for transactional systems, aren't well-suited for the new age of AI. Whether you're a seasoned CTO or an industry trailblazer, this webinar will help make your product ready to meet the competition by adopting an architecture that is optimized for AI innovation. Join Ahmad Jubran, Cloud Product Innovation Consultant, and learn how to adapt your solutions for cloud models the right way.