Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. However, in such setups the content that gets promoted through the client’s domain is actually hosted on the cloud CRM provider’s systems.

Cloud 285

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 201

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. Data Breaches Cloud Hopper gift card fraud Insight Enterprises microsoft Office365 PCM Inc. A digital intrusion at PCM Inc. ,

Cloud 286

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 156

Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

Krebs on Security

says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Office365 accounts to use multi-factor authentication. Security Tools cloud solution provider Microsoft Office 365 multi-factor authentication PCM breach

Preparing for Security in Cloud 3.0

Data Breach Today

Attorney Lisa Lifshitz on Addressing Legal, Regulatory Concerns She wrote the book on Cloud 3.0, and now attorney Lisa Lifshitz shares insights on key considerations for choosing cloud providers, as well as how to ensure compliance with emerging regulations

Cloud 185

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises.

Cloud 239

Cloud Security: How the Dialogue Has Shifted

Data Breach Today

Palo Alto Network's Matt Chiodi on the Evolution of Public Cloud Security In just five years' time, the public cloud security conversation has changed dramatically, says Matt Chiodi of Palo Alto Networks.

Cloud 230

Deception Technology in the Cloud Era

Data Breach Today

Don Gray of PacketViper Describes Evolution of the Technology Deception technology is evolving to help address cloud-based cyberthreats, says Don Gray of PacketViper, who describes the latest changes

Cloud 180

Unpacking the Google Cloud announcement

OpenText Information Management

At Enterprise World 2019 in Toronto, our CEO and CTO Mark Barrenechea announced OpenText’s expanded strategic partnership with Google Cloud. The announcement marks a major inflection point in the evolution of our cloud business at OpenText™ and solidifies our relationship with Google.

Cloud 83

Cloud Security: Mess It Up and It's on You

Data Breach Today

Jay Heiser of Gartner Says the Cloud Demands New Security Processes, Tools The transition to cloud-based software and infrastructure has revolutionized development and services. Jay Heiser of Gartner says if organizations don't get cloud security right, it's their own fault.

IT 198

QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

Krebs on Security

Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days. based iNSYNQ specializes in providing cloud-based QuickBooks accounting software and services.

Imperva: Data Breach Caused by Cloud Misconfiguration

Threatpost

Breach Cloud Security Amazon Web Services api key AWS cloud database exposure imperva misconfiguration TLS certificatesHackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

Cloud 114

Put Those Cloud Security Objections to Rest

Data Breach Today

In the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers

Cloud 176

Seeing patterns in the clouds

OpenText Information Management

Recently I had an opportunity to sit down with one of our customers – a large multi-national bank – to talk about their cloud journey in Enterprise Information Management. Cloud cloud Managed Service OpenText Cloud private cloud

Cloud 65

Do You Know What Cloud Assets You Actually Have?

Data Breach Today

Sam Curcuruto of Expanse on the Role of Cloud Governance in Maintaining Control Many organizations struggle to understand what cloud assets they actually have. Sam Curcuruto of Expanse explains the role cloud governance plays in gaining better clarity and control

Cloud 185

The OpenText Enterprise Cloud and OT2

OpenText Information Management

By spanning off-cloud, business networks, private and public clouds, the OpenText Enterprise Cloud delivers information advantage through the ability to access business-critical information in the most convenient, secure and agile ways possible. It is a hybrid world.

Cloud 56

Why Healthcare is Moving to Cloud: Data Security

Perficient Data & Analytics

The following is the first blog in a series about why healthcare organizations are moving to cloud. Gone are the days of healthcare organizations wondering if they need to utilize the cloud. Cloud adoption is prevailing in healthcare for a multitude of reasons.

Cloud 83

Going ‘cloud first’? Start with an easy win: Cloud fax

OpenText Information Management

Have you adopted a ‘cloud first’ strategy where you look to the cloud before an on-premises alternative? There are many benefits to transitioning your applications to a cloud service provider. There are even more when … The post Going ‘cloud first’?

Cloud 61

Cloud Security: Beyond CASB

Data Breach Today

Oracle's Amit Zavery on Taking a Comprehensive Approach Cloud access security brokers are not a panacea for all cloud security problems, says Oracle's Amit Zavery, who advocates an end-to-end approach

Cloud 130

EDW in the Cloud TCO

Perficient Data & Analytics

Usually, the OpEx was slightly higher for the cloud TCO versus the on-prem TCO required substantial capital investment. Part of our assessment was to compare TCO between the different deployment options, on-prem and cloud.

Cloud 74

The Calico cloud

DXC Technology

You know what’s one of the real pains of cloud and container based computing? Workloads on a cloud come and go faster than you can read this story. Cloud Networks Calico networking SDNNetworking. Connecting those workloads, especially when they become even more ephemeral containers, is not easy. That’s where the open-source Software Defined Network (SDN) Calico comes in. SDN […].

Cloud 78

CoreDNS: The DNS for cloud-native computing

DXC Technology

Cloud Networks cloud cloud computing cloud-native containers CoreDNS DNS Kubernetes microservicesI have a t-shirt which reads, from top to bottom: “It’s not DNS. There’s no way it’s DNS. It was DNS!” ” As every sysadmin knows, all too many network problems boil down to a Domain Name System (DNS) blunder. That’s already annoying, but when you have to deal with a DNS headache with fast-moving containers […].

Cloud 82

Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack

Krebs on Security

Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned.

Why Healthcare is Moving to Cloud: Connect Data Silos

Perficient Data & Analytics

The following is the third blog in a series about why healthcare organizations are moving to the cloud. In this series so far, we have looked at how the cloud brings robust data security and the cost savings and efficiencies that the cloud delivers for healthcare organizations.

Cloud 70

Put Those Cloud Security Objections to Rest

Data Breach Today

In the wake of digital transformation, there remain some organizations that - for security reasons - resist the temptation to move to the cloud. Zscaler's Bil Harmer addresses these, as well as the critical questions security leaders should ask of cloud service providers What are their objections?

Analysis: Preventing Data Exposure in the Cloud

Data Breach Today

The latest edition of the ISMG Security Report offers an in-depth analysis of how to prevent data exposure in the cloud. Plus: why PCI's new contactless payment standard lacks PINs, and how to go beyond the hype to accurately define "zero trust

Cloud 100

Financial services are embracing multi-cloud

DXC Technology

Multi-clouds — environments made up of multiple public and private clouds typically used for different purposes — may well be the cloud of choice for banks. That’s according to an independent report by 451 Research, ‘Multi-Cloud Fundamental to Financial Services Transformation.’ Banking & Capital Markets Cloud Insurance financial services hybrid cloud

Embrace Full-Scale Cloud Adoption with a Comprehensive Cloud Data Management Strategy

Data Breach Today

Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the cloud, considering a total of 4.5

Cloud 138

Cloud Atlas Uses Polymorphic Techniques to Avoid Detection

Data Breach Today

APT Group Adds New Infection Chain to Its Usual Malware and Tactics The group behind the Cloud Atlas cyber espionage campaigns, which were first detected five years ago, is now deploying polymorphic techniques designed to avoid monitoring and detection, according to researchers at Kaspersky Lab

Cloud 181

Is Your Data Safe in the Cloud?

Thales eSecurity

As organizations move more of their sensitive data to cloud platforms for the efficiency, flexibility and scalability that it promises, security and control continue to be a significant obstacle to this adoption. The post Is Your Data Safe in the Cloud?

Cloud 130

The Role of the Cloud in Updating Security

Data Breach Today

RiskIQ's Aaron Mog on the Need for a Security Rebirth The velocity of change at large corporations has made traditional IT security methods inadequate, but cloud-based solutions can play an important role, says Aaron Mog of RiskIQ

Cloud 163

Why intelligent cloud ERP delivers increased value

DXC Technology

The arrival of intelligent cloud ERP provides the core technology that allows organisations to build the agile foundation required for entering new markets and becoming the disruptors of their industry. Intelligent cloud ERP […]. Cloud Platform cloud based ERPAgility is the name of the game for businesses who want the ability to respond to threats and opportunities in their marketplace.

Cloud 74

The OpenText Enterprise Cloud

OpenText Information Management

It’s agile, it’s affordable, it’s the cloud—and for the Intelligent and Connected Enterprise, it is a business imperative. The cloud will keep your overhead lean and your storage requirements leaner.

Cloud 56

Ignore the hysteria, Cloud Foundry is just fine

DXC Technology

Recently, Rishidot analyst Krishnan Subramanian proclaimed the Cloud Foundry, Platform-as-a-Service (PaaS) cloud, had met its demise as a standalone platform. That’s news to me, and I cover Cloud Foundry like paint. What got Subramanian so frazzled was Cloud Foundry started offering Docker in place of its own container runtime, Garden. Applications Cloud DevOps Platform Uncategorized Cloud Foundry containers Docker Kubernetes PaaS

Cloud 87

The Evolution of IAM in the Cloud

Data Breach Today

More organizations are deploying single sign-on mechanisms when they move to software-as-a-service applications to help enhance authentication and control access, says Moshe Ferber, chairman of the Israeli chapter of the Cloud Security Alliance

Cloud Security: 'Big Data' Leak Prevention Essentials

Data Breach Today

Big data analytics and search tools give organizations the ability to analyze information faster than ever before.