5 Cloud Trends That Will Reshape IT in 2021


We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage.

Cloud 109

Banking on Cloud Security

Data Breach Today

These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says

Cloud 165

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cloud Pak for Security

Data Breach Today

Cloud Pak for Security Digital transformation is accelerating. This webinar will take a deep dive into IBM's Cloud Pak for Security where you will learn how to: Gain insights without moving your data; Respond faster to secuirty incidents with automation and investigative capabilities; Run anywhere, connect security openly Organisations are adopting SAAS solutions at increasing rates to reduce internal IT constraints and budgets.

Cloud 155

Sharing Cloud Security Responsibilities

Data Breach Today

A cloud computing security model needs to be customized to fit how the cloud provider serves its clients, says privacy attorney Adam Greene

Cloud 152

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 212

Cloud misconfiguration, a major risk for cloud security

Security Affairs

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Cloud misconfiguration remains the top cause of data breaches in the cloud, and the ongoing COVID-19 pandemic is is exacerbating the situation.

Cloud 85

The Overlooked Security Risks of The Cloud


Nate Warfield, CTO of Prevaliion, discusses the top security concerns for those embracing virtual machines, public cloud storage and cloud strategies for remote working. Cloud Security InfoSec Insider

Cloud 97

The Misaligned Incentives for Cloud Security

Schneier on Security

Russia’s Sunburst cyberespionage campaign , discovered late last year, impacted more than 100 large companies and US federal agencies, including the Treasury, Energy, Justice, and Homeland Security departments. Cloud weaknesses were also critical in a 2019 breach at Capital One.

Cloud 111

The Future of Cloud Security

Data Breach Today

Forcepoint's Homayun Yaqub Previews New Virtual Roundtable Series What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented?

Cloud 164

Next Cloud Security Challenge: Containers and Kubernetes

Data Breach Today

Agile Development Calls for New Ways to Secure Cloud Services The increasing use of containers and orchestration tools, such as Kubernetes, are driving demand for new cloud security and application deployment processes, according to research from the according to research from the Cloud Security Alliance presented Monday at the RSA 2020 conference.

Cloud 192

Cybersecurity Leadership: It’s About Cloud Security

Data Breach Today

CEOs and CISOs on Managing Visibility, Accessibility and Risk Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility.

Cloud 158

Cloud Protection: How to Secure Server Environments

Data Breach Today

Cloud 200

Building Security Into Cloud Migration

Data Breach Today

Microsoft's Terence Gomes on Cloud Security and Some Misconceptions It's essential that security be built into cloud migrations and not handled as an afterthought, says Terence Gomes of Microsoft

Cloud 141

Cloud Security: Overcoming Roadblocks

Data Breach Today

While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration

Cloud 109

How Telework Is Changing Cloud Security

Data Breach Today

Jim Reavis of the Cloud Security Alliance on Adjusting CISOs' Priorities Because the COVID-19 pandemic had led to more employees working from home, cloud services have become indispensable, but the pressure is on organizations to ensure security, says Jim Reavis, CEO of the Cloud Security Alliance

Cloud 161

Is Your Security Stack Ready for the Modern Cloud?

Data Breach Today

But behind the scenes, many enterprises are struggling from the impacts of cloud migration and the “shift left” movement. Knox Anderson of Sysdig shares tips for approaching the modern cloud Digital transformation makes the headlines.

Cloud-based security: SECaaS

eSecurity Planet

To ease these burdens, SECaaS and SOCaaS vendors have emerged as cloud-based security as a service that can collect, analyze, and correlate your information from diverse systems and applications — turning former headaches into actionable information security intelligence.

Cloud 73

AWS Unveils Cloud Security Competency Program for MSSPs

eSecurity Planet

Amazon Web Services has unveiled a revamped competency for managed security service providers (MSSPs) that is intended to make it simpler for end customers to identify AWS partners that have the most security services expertise. Cloud Misconfiguration Fixes.

Cloud 73

Top Cloud Security Companies & Tools

eSecurity Planet

Cloud computing has become ubiquitous because of its agility and cost savings — but along with those benefits have come security concerns. Among the areas addressed by cloud security products are access control , workload security, privacy and compliance , and more.

Cloud 52

Why MSPs must prioritise Cloud security

IT Governance

Cloud computing has become an integral part of business, providing affordable and flexible options for organisations as they grow. But as Cloud services become more popular, they become increasingly lucrative targets for cyber criminals. Cyber Security

Cloud 87

The Remote Workforce: Cloud Security Challenges

Data Breach Today

CISO of International Law Firm on Making the Right Moves As a result of the rapid move to a remote workforce, now is a golden opportunity to refine cybersecurity approaches - especially for the cloud, says Christian Toon, CISO at the international law firm, Pinsent Masons

Cloud 179

Cloud hosting provider Swiss Cloud suffered a ransomware attack

Security Affairs

Swiss cloud hosting provider Swiss Cloud has suffered a ransomware attack that seriously impacted its server infrastructure. On April 27 the Swiss cloud hosting provider was hit by a ransomware attack that brought down the company’s server infrastructure.

Cloud 109

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises.

Cloud 174

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security. Related: The shared burden of securing the Internet of Things. Company networks must support endless permutations of users and apps, both on-premises and in the Internet cloud. Security, meanwhile, has morphed into a glut of point solutions that mostly serve to highlight the myriad gaps in an ever-expanding attack surface.

Mapping of On-Premises Security Controls Versus Services Offered by Major Cloud Providers via Managed Sentinal

IG Guru

The post Mapping of On-Premises Security Controls Versus Services Offered by Major Cloud Providers via Managed Sentinal appeared first on IG GURU. Check out the post and hi-res image option here.

Cloud 83

Cloud Security: How the Dialogue Has Shifted

Data Breach Today

Palo Alto Network's Matt Chiodi on the Evolution of Public Cloud Security In just five years' time, the public cloud security conversation has changed dramatically, says Matt Chiodi of Palo Alto Networks. But security leaders still struggle with visibility and compliance

Cloud 165

Cloud-Native Businesses Struggle with Security

Dark Reading

More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them

Cloud 86

Storing Encrypted Photos in Google’s Cloud

Schneier on Security

New paper: “ Encrypted Cloud Photo Storage Using Google Photos “: Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for mobile devices.

Race to the Cloud: Can Security Keep Pace With Adoption?

Data Breach Today

IBM's Limor Kessem on New Study of Cloud Security Gaps Since the advent of the COVID-19 crisis, many enterprises have moved new workloads to the cloud. But have they been just as swift to adopt cybersecurity best practices in these multi-cloud environments?

Cloud 147

Hackers Hide Software Skimmer in Social Media Sharing Icons

Security Affairs

Security researchers have uncovered a new technique to inject a software skimmer onto checkout pages, the malware hides in social media buttons. Security experts at Sansec have detailed a new technique used by crooks to inject a software skimmer into checkout pages.

Cloud Security: Beyond CASB

Data Breach Today

Oracle's Amit Zavery on Taking a Comprehensive Approach Cloud access security brokers are not a panacea for all cloud security problems, says Oracle's Amit Zavery, who advocates an end-to-end approach

Cloud 100

Protecting the Cloud Through Automation

Data Breach Today

Roger Hellman of BMC Software Discusses Cloud Automation and Remediation Automation is becoming a powerful tool in cloud security. Roger Hellman of BMC Software discusses specific areas where automation has been beneficial

Cloud 183

The Evolution of Cloud Governance

Data Breach Today

Expanse CTO Matt Kraning on Meeting New Demands for Cloud Security The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation.

Even Ethical Hackers Abuse Cloud Services

Data Breach Today

Cloud 230

‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise


A chain of exploits could allow a malicious Azure user to infiltrate other customers' cloud instances within Microsoft's container-as-a-service offering. Cloud Security Vulnerabilities

Cloud 99

Announcing OpenText Security and Protection Cloud

OpenText Information Management

2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. Cloud Security CE 20.4 Cloud Editions 20.4 Security and Protectoin CLouds

Cloud 59

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

Related: What it will take to truly secure data lakes. A lack of understanding of these relationships is a big reason why cloud breaches happen. The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships. With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security.

Grow Faster with OpenText Cloud Edition 21.1

OpenText Information Management

The launch of OpenText™ Cloud Edition (CE) 21.1 includes new features, products, cloud services and solutions to empower modern work, engage customers, connect global commerce and protect data. OpenText Content Cloud CE 21.1? Security & Protection Cloud modern work

Cloud 66

Securing Italy’s Journey to the Cloud

Thales Cloud Protection & Licensing

Securing Italy’s Journey to the Cloud. Italy is increasingly adopting cloud computing technologies and platforms to accelerate the country’s digital transformation. Italy’s cloud adoption is growing. billion in Italian cloud computing services.