5 Cloud Trends That Will Reshape IT in 2021

DXC

We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage.

Cloud 109

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Services cloud managed services Professional Services Migrate to the cloud

Cloud 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Demystifying cloud migration

OpenText Information Management

The business world is repeatedly proving that cloud is fast, reliable, scalable and­ cost-effective. When it comes to greenfield cloud deployments, the business case for deploying in the cloud is strong and compelling.

Cloud 62

Banking on Cloud Security

Data Breach Today

These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says "Better, cheaper, faster."

Cloud 165

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud

Data Breach Today

Group Uses Compromised Credentials to Attack Cloud Providers, Researchers Say Cryptojacking group TeamTNT is leveraging compromised Amazon Web Services credentials to attack its cloud environments through the platform’s API, according to researchers from Unit 42 at Palo Alto Networks

Cloud 231

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 192

Not So Fastly: Global Outage Highlights Cloud Challenges

Data Breach Today

Without Resiliency Plans, Cloud Infrastructure Can Become Single Point of Failure Content delivery network Fastly says its global outage on Tuesday was caused by an unanticipated software bug, which it has now patched.

Cloud 245

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 155

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? News & Events Cloud & Applications OpenText Cloud Cloud Summit information matters cloud event cloud assessment free event cloud readiness

Cloud 79

Ultimate Guide to the Cloud Data Lake Engine

This guide describes how to evaluate cloud data lake engine offerings based on their ability to deliver on their promise of improving performance, data accessibility, and operational efficiency as compared with earlier methods of querying the data lake.

Storing Encrypted Photos in Google’s Cloud

Schneier on Security

New paper: “ Encrypted Cloud Photo Storage Using Google Photos “: Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for mobile devices.

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 152

Cloud hosting provider Swiss Cloud suffered a ransomware attack

Security Affairs

Swiss cloud hosting provider Swiss Cloud has suffered a ransomware attack that seriously impacted its server infrastructure. On April 27 the Swiss cloud hosting provider was hit by a ransomware attack that brought down the company’s server infrastructure.

Cloud 109

Top 12 Cloud Security Best Practices for 2021

eSecurity Planet

From the very beginning of the cloud computing era, security has been the biggest concern among enterprises considering the public cloud. In addition, 95 percent of survey respondents confirmed that they are extremely to moderately concerned about public cloud security.

Cloud 69

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

Cloud misconfiguration, a major risk for cloud security

Security Affairs

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Cloud misconfiguration remains the top cause of data breaches in the cloud, and the ongoing COVID-19 pandemic is is exacerbating the situation.

Cloud 85

Cybercriminals Are Targeting Your Cloud Apps

Data Breach Today

Using CASB to Take Zero Trust to the Next Level

Cloud 213

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 242

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation.

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 183

The Misaligned Incentives for Cloud Security

Schneier on Security

A crucial part of the Russians’ success was their ability to move through these organizations by compromising cloud and local network identity systems to then access cloud accounts and pilfer emails and files. Cloud weaknesses were also critical in a 2019 breach at Capital One.

Cloud 111

The Overlooked Security Risks of The Cloud

Threatpost

Nate Warfield, CTO of Prevaliion, discusses the top security concerns for those embracing virtual machines, public cloud storage and cloud strategies for remote working. Cloud Security InfoSec Insider

Cloud 97

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Cloud 230

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 212

Grow Faster with OpenText Cloud Edition 21.1

OpenText Information Management

The launch of OpenText™ Cloud Edition (CE) 21.1 includes new features, products, cloud services and solutions to empower modern work, engage customers, connect global commerce and protect data. OpenText Content Cloud CE 21.1? Security & Protection Cloud modern work

Cloud 66

Performance considerations for cloud services provisioning: Value-added services

OpenText Information Management

This blog describes performance parameters for cloud services that are specific to two value-added services: performance … The post Performance considerations for cloud services provisioning: Value-added services appeared first on OpenText Blogs.

Cloud 55

Automated Monitoring in the Cloud

Data Breach Today

Glen Hymers of Save The Children International on Implementing a Cloud-First Approach Glen Hymers, CISO and head of data protection at the U.K.-based

Cloud 147

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

Future-proofing your business with the cloud

OpenText Information Management

These advancements are not slowing down, and the cloud is the platform needed to support many of them. The COVID-19 pandemic accelerated the adoption of cloud-based technology. Within a month … The post Future-proofing your business with the cloud appeared first on OpenText Blogs.

Cloud 68

‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise

Threatpost

A chain of exploits could allow a malicious Azure user to infiltrate other customers' cloud instances within Microsoft's container-as-a-service offering. Cloud Security Vulnerabilities

Cloud 99

Reskilling IT workers for the cloud

DXC

Competition for highly skilled IT workers is fierce, especially those experienced in public cloud and complex multicloud and hybrid cloud environments. The post Reskilling IT workers for the cloud appeared first on DXC Blogs. Cloud cloud education cloud skills

Cloud 60

Breach Victims Piling Up in Wake of Cloud Vendor Attack

Data Breach Today

Impact of Apparent Ransomware Attack on Netgain Technology Continues to Grow Months after an apparent ransomware attack against cloud hosting and managed service provider Netgain Technology, the list of healthcare sector entities reporting major health data breaches linked to the incident is growin

Cloud 239

Product Transformation: Adapting Your Solutions for Cloud Models

Speaker: Ahmad Jubran, Cloud Product Innovation Consultant

In order to maintain a competitive advantage, CTOs and product managers are shifting their products to the cloud. Many do this by simply replicating their current architectures in the cloud. Those previous architectures, which were optimized for transactional systems, aren't well-suited for the new age of AI. Whether you're a seasoned CTO or an industry trailblazer, this webinar will help make your product ready to meet the competition by adopting an architecture that is optimized for AI innovation. Join Ahmad Jubran, Cloud Product Innovation Consultant, and learn how to adapt your solutions for cloud models the right way.

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 148

OnDemand | The Risks of Cloud Computing

Data Breach Today

Remote Working with Teams & Zoom View this webinar to learn about the growth in cloud use, the need for security, the examples of cloud data loss concerns and how we address them

Risk 167

Performance considerations for cloud services provisioning: Infrastructure services

OpenText Information Management

This can even lead to business downtime in persistent load scenarios as a backlog of requests builds … The post Performance considerations for cloud services provisioning: Infrastructure services appeared first on OpenText Blogs.

Cloud 55

Cybersecurity Leadership: It’s About Cloud Security

Data Breach Today

CEOs and CISOs on Managing Visibility, Accessibility and Risk Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility.

Cloud 158

Top Considerations for Building an Open Cloud Data Lake

In this paper, we explore the top considerations for building a cloud data lake including architectural principles, when to use cloud data lake engines and how to empower non-technical users.