5 Cloud Trends That Will Reshape IT in 2021

DXC

We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage.

Cloud 106

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Services cloud managed services Professional Services Migrate to the cloud

Cloud 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Banking on Cloud Security

Data Breach Today

These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says "Better, cheaper, faster."

Cloud 173

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 157

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 199

Automated Monitoring in the Cloud

Data Breach Today

Glen Hymers of Save The Children International on Implementing a Cloud-First Approach Glen Hymers, CISO and head of data protection at the U.K.-based

Cloud 148

Cloud-based security: SECaaS

eSecurity Planet

To ease these burdens, SECaaS and SOCaaS vendors have emerged as cloud-based security as a service that can collect, analyze, and correlate your information from diverse systems and applications — turning former headaches into actionable information security intelligence. Cloud

Cloud 86

NSA Warns of Hacking Tactics That Target Cloud Resources

Data Breach Today

Alert Follows Week's Worth of Revelations About SolarWinds Breach The NSA has issued a warning about two hacking techniques that could allow threat actors to access cloud resources by bypassing authentication mechanisms.

Cloud 245

NSA Warns Over Hacking Tactics That Target Cloud Resources

Data Breach Today

Alert Follows Week's Worth of Revelations Over SolarWinds Breach The NSA has issued a warning about two hacking techniques that could allow threat actors to access cloud resources by bypassing authentication mechanisms.

Cloud 236

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 120

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? If you’re wondering how to begin your cloud journey, what you need to do to advance it or where you need to go to get your hands on everything cloud-journey related, the OpenText™ Cloud Summit is a must-attend event for … The post Start your cloud journey at Cloud Summit appeared first on OpenText Blogs.

Cloud 59

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 151

CISA Warns of Surge in Attacks Targeting Cloud Services

Data Breach Today

Agency Offers Risk Mitigation Advice CISA warns that hackers are increasingly targeting cloud services by waging phishing schemes and brute-force attacks.

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance The bad news: Visibility and governance take a huge hit.

Announcing OpenText Content Cloud

OpenText Information Management

The OpenText™ Content Cloud is a key … The post Announcing OpenText Content Cloud appeared first on OpenText Blogs. Cloud Content Services Content Cloud CE 20.4 Cloud Editions 20.4

Cloud 55

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 146

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Creating Cloud-Hosted Attack Infrastructures a Common Practice, Academic Researchers Find Many ethical hackers and other security professionals, such as penetration testers, have weaponized cloud platforms to host online attack infrastructure or have used the platforms to conduct reconnaissance, according security researchers at Texas Tech University

Cloud 184

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. Those sources say the attackers stole administrative credentials that PCM uses to manage client accounts within Office 365 , a cloud-based file and email sharing service run by Microsoft Corp. Data Breaches Cloud Hopper gift card fraud Insight Enterprises microsoft Office365 PCM Inc. A digital intrusion at PCM Inc. ,

Cloud 198

Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. United Rentals would not name the third party marketing firm thought to be involved, but passive DNS lookups on the UR subdomain referenced in the phishing email (used by UL for marketing since 2014 and visible in the screenshot above as “wVw.unitedrentals.com”) points to Pardot , an email marketing division of cloud CRM giant Salesforce.

Cloud 186

Want the full benefits of cloud? Rethink the journey.

DXC

There’s no denying that companies have realized many benefits from using public clouds – hyperscalability, faster deployment and, perhaps most importantly, flexible operating costs. But when it comes to public cloud migration, […]. The post Want the full benefits of cloud?

Cloud 57

Cloud Attacks Are Bypassing MFA, Feds Warn

Threatpost

CISA has issued an alert warning that cloud services at U.S. Cloud Security Government Vulnerabilities Web Securityorganizations are being actively and successfully targeted.

Cloud 103

Announcing OpenText Developer Cloud

OpenText Information Management

These competing priorities have resulted developers requiring a faster, smarter, way to build applications and solution extensions using service-based capabilities in the cloud. Cloud Developers CE 20.4 Cloud Editions 20.4 Developer Cloud

Cloud 52

What is cloud content management?

OpenText Information Management

They required extra labor, … The post What is cloud content management? Cloud Content Services cloud ECM Forrester Extended ECM content services CS-xECM-CE Cloud architecture cloud content management

Cloud 62

NSA warns of cloud attacks on authentication mechanisms

Security Affairs

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks to cloud infrastructure. The attack techniques are abused by hackers are using to escalate access from compromised local networks into cloud-based infrastructure.

Announcing OpenText Business Network Cloud

OpenText Information Management

Companies around the world have faced immense disruption throughout 2020, with Deloitte highlighting that the COVID-19 pandemic will be a ‘black swan’ event, a once in a lifetime event that will force supply chains to be restructured and accelerate the adoption of cloud-based technologies.

Cloud 64

Migration to cloud content management now vital

OpenText Information Management

While modernizing cloud content management is a critical step in this transformation, new Forrester research reveals that most content today is still stored on-premises. Technologies Information Management Cloud cloud Forrester Research

Cloud 82

Cloud Security: Overcoming Roadblocks

Data Breach Today

While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration

Cloud 107

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 148

OnDemand | The Risks of Cloud Computing

Data Breach Today

Remote Working with Teams & Zoom View this webinar to learn about the growth in cloud use, the need for security, the examples of cloud data loss concerns and how we address them

Risk 120

Announcing the OpenText Experience Cloud

OpenText Information Management

Participation in the “experience economy” means becoming more agile, more data-driven and more … The post Announcing the OpenText Experience Cloud appeared first on OpenText Blogs. Cloud Customer Experience CE 20.4 Cloud Editions 20.4 Experience Cloud

Cloud 55

Doing Cloud Migration and Data Governance Right the First Time

erwin

More and more companies are looking at cloud migration. So if you’re going to move from your data from on-premise legacy data stores and warehouse systems to the cloud, you should do it right the first time. Automated Cloud Migration. Why You Need Cloud Data Governance.

Implementing 'Zero Trust' in a Hybrid Cloud Environment

Data Breach Today

Gartner's Rajpreet Kaur on Using Multiple Technologies Implementing the "zero trust" model in a hybrid cloud environment presents challenges, says Rajpreet Kaur, senior principal analyst at Gartner, who recommends a phased approach

Cloud 156

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference

Cloud 152

Hacking Group Dropping Malware Via Facebook, Cloud Services

Data Breach Today

Cloud 169

ibml launches new Cloud Capture platform

Document Imaging Report

January 27, 2021 – ibml announces today the launch of a cloud-native SaaS [1] platform which enables enterprises to intelligently capture, process and manage content from any source using an on-demand scalable ‘pay for what you need’ pricing model based on document volumes and features used.

Cloud 69

Google Cloud Buckets Exposed in Rampant Misconfiguration

Threatpost

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

Cloud 82

5 key things to consider when migrating to the cloud

OpenText Information Management

Cloud computing is now touching all aspects of information technology, and document and data archiving is no exception. When it comes to security, cost savings, reliable services and scalability, there is no bigger advantage than storing your most valuable assets in the cloud. But migrating to the cloud is more complex than simply moving your … The post 5 key things to consider when migrating to the cloud appeared first on OpenText Blogs.

Cloud 80

Cloud Protection: How to Secure Server Environments

Data Breach Today

Jake King of Cmd Charts the Evolution of Cloud Workload Protection Platforms Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd

Cloud 158

2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud

Threatpost

Hacks IoT Malware Mobile Security Privacy Vulnerabilities Web Security 2021 Cybersecurity Trends 5G artificial intelligence Cloud Security Cloud Security Posture Management inbox attacks Insider threats machine learning mobile threats

Cloud 110