Banking on Cloud Security

Data Breach Today

These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says "Better, cheaper, faster."

Cloud 171

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 157

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 238

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity

Cloud 198

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Announcing OpenText Content Cloud

OpenText Information Management

The OpenText™ Content Cloud is a key … The post Announcing OpenText Content Cloud appeared first on OpenText Blogs. Cloud Content Services Content Cloud CE 20.4 Cloud Editions 20.4

Cloud 55

Announcing OpenText Business Network Cloud

OpenText Information Management

Companies around the world have faced immense disruption throughout 2020, with Deloitte highlighting that the COVID-19 pandemic will be a ‘black swan’ event, a once in a lifetime event that will force supply chains to be restructured and accelerate the adoption of cloud-based technologies.

Cloud 66

Start your cloud journey at Cloud Summit

OpenText Information Management

Did you know that this year, 83% of enterprise workloads will run in the cloud? If you’re wondering how to begin your cloud journey, what you need to do to advance it or where you need to go to get your hands on everything cloud-journey related, the OpenText™ Cloud Summit is a must-attend event for … The post Start your cloud journey at Cloud Summit appeared first on OpenText Blogs.

Cloud 61

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 119

What is cloud content management?

OpenText Information Management

They required extra labor, … The post What is cloud content management? Cloud Content Services cloud ECM Forrester Extended ECM content services CS-xECM-CE Cloud architecture cloud content management

Cloud 64

Mergers & Acquisitions: How to Handle Your Data feat. Oracle & Onna

Speaker: Lisa Ripley: Director of eDiscovery & Information Governance, Legal Operations at Oracle & Scott McVeigh: Senior Solutions Consultant, Onna

Historically, mergers and acquisitions have always been difficult, but in the age of endless cloud-based tools, these processes have become even more complex. Mergers & Acquisitions: How to Handle your Data Featuring Oracle. WEBINAR REGISTRATION.

Cloud IAM: Integration Issues

Data Breach Today

A major misconception about cloud IAM is that it's easy to implement, says Mark Perry, CTO for APAC at Ping Identity. Implementation poses challenges, and cloud IAM must be carefully integrated with other systems, he says

Cloud 150

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Creating Cloud-Hosted Attack Infrastructures a Common Practice, Academic Researchers Find Many ethical hackers and other security professionals, such as penetration testers, have weaponized cloud platforms to host online attack infrastructure or have used the platforms to conduct reconnaissance, according security researchers at Texas Tech University

Cloud 182

Announcing the OpenText Experience Cloud

OpenText Information Management

Participation in the “experience economy” means becoming more agile, more data-driven and more … The post Announcing the OpenText Experience Cloud appeared first on OpenText Blogs. Cloud Customer Experience CE 20.4 Cloud Editions 20.4 Experience Cloud

Cloud 55

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance The bad news: Visibility and governance take a huge hit.

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 144

Google Cloud Buckets Exposed in Rampant Misconfiguration

Threatpost

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

Cloud 90

Migration to cloud content management now vital

OpenText Information Management

While modernizing cloud content management is a critical step in this transformation, new Forrester research reveals that most content today is still stored on-premises. Technologies Information Management Cloud cloud Forrester Research

Cloud 82

OnDemand | The Risks of Cloud Computing

Data Breach Today

Remote Working with Teams & Zoom View this webinar to learn about the growth in cloud use, the need for security, the examples of cloud data loss concerns and how we address them

Risk 119

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 147

Announcing OpenText Security and Protection Cloud

OpenText Information Management

Due to the proliferation of remote, dispersed and intermittently connected endpoints, corporate investigative teams may need to acquire relevant digital evidence … The post Announcing OpenText Security and Protection Cloud appeared first on OpenText Blogs. Cloud Security CE 20.4

Cloud 59

Cloud Security: Overcoming Roadblocks

Data Breach Today

While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration

Cloud 107

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. Those sources say the attackers stole administrative credentials that PCM uses to manage client accounts within Office 365 , a cloud-based file and email sharing service run by Microsoft Corp. Data Breaches Cloud Hopper gift card fraud Insight Enterprises microsoft Office365 PCM Inc. A digital intrusion at PCM Inc. ,

Cloud 177

Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. United Rentals would not name the third party marketing firm thought to be involved, but passive DNS lookups on the UR subdomain referenced in the phishing email (used by UL for marketing since 2014 and visible in the screenshot above as “wVw.unitedrentals.com”) points to Pardot , an email marketing division of cloud CRM giant Salesforce.

Cloud 166

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference

Cloud 151

Firestarter Android Malware Abuses Google Firebase Cloud Messaging

Threatpost

The DoNot APT threat group is leveraging the legitimate Google Firebase Cloud Messaging server as a command-and-control (C2) communication mechanism.

Cloud 97

Forrester study finds cloud security fears unfounded

OpenText Information Management

Organizations with major on-premises investments understandably have concerns about a wholesale shift to cloud content management. To explore how and why (or why not) enterprises are … The post Forrester study finds cloud security fears unfounded appeared first on OpenText Blogs.

Cloud 59

Containerd Bug Exposes Cloud Account Credentials

Threatpost

Cloud Security Vulnerabilities Bug cloud accounts container image-pulling containerd credential leak CVE-2020-15157 google compute platform host registry security vulnerabilityThe flaw (CVE-2020-15157) is located in the container image-pulling process.

Cloud 80

5 key things to consider when migrating to the cloud

OpenText Information Management

Cloud computing is now touching all aspects of information technology, and document and data archiving is no exception. When it comes to security, cost savings, reliable services and scalability, there is no bigger advantage than storing your most valuable assets in the cloud. But migrating to the cloud is more complex than simply moving your … The post 5 key things to consider when migrating to the cloud appeared first on OpenText Blogs.

Cloud 80

Cloud is Your Opportunity to get Security Right

Data Breach Today

A successful Cloud journey needs security to be considered at every stage. In this webinar, Scott McAvoy, Cloud Security Competency Lead of IBM will be outlining how to get security right with an open and integrated approach

Cloud 113

The Future of Cloud Security

Data Breach Today

Forcepoint's Homayun Yaqub Previews New Virtual Roundtable Series What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented? These are among the questions to be discussed in a new series of virtual roundtables hosted by Forcepoint and Homayun Yaqub

Cloud 125

Cloud Protection: How to Secure Server Environments

Data Breach Today

Jake King of Cmd Charts the Evolution of Cloud Workload Protection Platforms Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd

Cloud 157

Cloud Leak Exposes 320M Dating-Site Records

Threatpost

Breach Cloud Security InfoSec Insider Privacy Web Security adult dating sites cloud server data leak Elasticsearch exposure mailfire meow attack misconfiguration personal information records romantic preferences vpnMentor

Cloud 97

Do You Know Who's Lurking in Your Cloud Environment?

Dark Reading

A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform

Cloud 61

Cloud Security Startup Lightspin Emerges From Stealth

Dark Reading

The startup, founded by former white-hat hackers, has secured a $4 million seed round to close security gaps in cloud environments

Cloud 60

Assessing the Human Element in Cloud Access

Data Breach Today

Markku Rossi Discusses Shifting to Zero Standing Privileges Cloud security demands robust access management. Markku Rossi of SSH Communications Security discusses zero standing privileges and cloud access

Access 123

Cloud Misconfiguration Mishaps Businesses Must Watch

Dark Reading

Cloud security experts explain which misconfigurations are most common and highlight other areas of the cloud likely to threaten businesses

Cloud 77

Cybercrime Moves to the Cloud to Accelerate Attacks Amid Data Glut

Threatpost

A report on the underground economy finds that malicious actors are offering cloud-based troves of stolen data, accessible with handy tools to slice and dice what's on offer.

Cloud 81

Doing Cloud Migration and Data Governance Right the First Time

erwin

More and more companies are looking at cloud migration. So if you’re going to move from your data from on-premise legacy data stores and warehouse systems to the cloud, you should do it right the first time. Automated Cloud Migration. Why You Need Cloud Data Governance.

AWS Cryptojacking Worm Spreads Through the Cloud

Threatpost

Cloud Security Malware Amazon Web Services AWS cado security credential harvesting cryptojacking cryptomining Monero teamtnt WormThe malware harvests AWS credentials and installs Monero cryptominers.

Cloud 112