
Shift to work-from-home: Most IT pros worried about cloud security
As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …

You have to consider cybersecurity at all points of a cloud migration
Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …

Enterprises regard the cloud as critical for innovation, but struggle with security
Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …

Encryption is finally being used primarily to protect personal data rather than just for compliance
As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …

Total end-user spending on IT infrastructure products recovers
Total end-user spending on IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, recovered …

While many migrate security tools to the cloud, concerns remain
While many companies are beginning to migrate security tools to the cloud, a significant number have concerns, a survey by Exabeam reveals. The survey highlights data privacy, …

Europe’s Gaia-X cloud service faces a difficult future
In January, Microsoft reported its fiscal 2020 second quarter results. Among the company’s many impressive accomplishments is a 62% growth (yeay-over-year) of its Azure cloud …

Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization
79% of enterprises want better integrated security and governance for their data in the cloud, a survey from AtScale reveals. “As more enterprises embrace cloud …

Devices on 5G networks demand differentiated security solutions
There will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then, according to the SMU Office of …

You are focusing too much on vulnerabilities that pose little danger
Only half of the vulnerabilities in cloud containers ever posed a threat, according to a Rezilion study. The top 20 most popular container images on DockerHub were analyzed to …

Cloud-based collaboration tools are a major driver of data exfiltration
Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today’s digital …

Organizations lack confidence in their network security
IoT is barreling toward the enterprise, but organizations remain highly vulnerable to IoT-based attacks, according to Extreme Networks. The report, which surveyed 540 IT …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility