cloud

Upgrade to BIG Iron for better Cloud, AI and security support on IBM

The Big Iron OS of IBM was upgraded a short while ago to address all issues related to provisioning and use of Linux applications and utilities. The move should attract new enterprise customers who were looking for an all-inclusive mainframe cloud platform that offers utmost security and AI application development and support. IBM’s latest z/OS […]

Over 3.1 million cyber attacks on cloud user accounts

McAfee released an ‘MVISION’ Cloud User Report on Tuesday stating that the year 2020 witnessed over 3.1 million cyber attacks on cloud user accounts. And most of them were malware related followed by account hijackings and targeted attacks against vulnerabilities. As per the report, the industries that were majorly targeted include retail, technology, financial, public […]

Cloud Misconfiguration leads to data exposure of Android and iOS users

Cloud Misconfigurations are leading to the data exposure of users using android and iOS apps says a research carried out by Zimperium. And what’s surprising in this conformation is that the problems are occurring on platforms launched by world renowned tech companies like Amazon Web Services, Google Cloud, and Microsoft Azure. Another highlight from the […]

39% of Healthcare Organizations Suffered Ransomware Attacks in the Cloud in 2020

As a result of a cloud breach, one in four healthcare organization was fined for non-compliance and 1 in 10 was sued, Netwrix study finds.  IRVINE, Calif., February 24, 2021 – Netwrix, a cybersecurity vendor that makes data security easy, today announced findings for the healthcare sector from its global 2021 Netwrix Cloud Data Security Report.   The survey found that […]

IS YOUR SECURITY TEAM CLOUD READY?

This post was originally published by (ISC)² Management. Cloud services play a key role in the digital transformation and operation of today’s enterprises. Yet security teams are often left out of planning these initiatives, increasing the level of risk organizations will face. Security is an integral part of adopting cloud services, without being a barrier […]

Cloud service providers to reveal foreign clientele identity

Donald Trump, the 45Th US President who took an exit from his designation a few hours ago, left the white house with a last-minute order that makes it mandatory for cloud service providers to reveal the identity of their foreign clients. Although, the order should block certain companies operating on the foreign soil to make […]

Cloud Security that Performs

This post was originally published by Nat Kausik. We heard from another customer today that their incumbent cloud security vendor keeps going down. And when it is not down, DLP scans take hours, if they complete at all.   What is going on? Cloud security offerings are typically based  on the network security model, where fixed […]

Bitglass, The FedRAMP-Authorized Platform for Total Cloud Security

This post was originally published by Jacob Serpa. As evidenced by its FedRAMP Authorization from the Federal Risk and Authorization Management Program, Bitglass’ Total Cloud Security Platform is an ideal choice for security in the government space. It is within this vertical that organizations handle sensitive data like personally identifiable information (PII) and have perhaps the most […]

Accelerating Security and the Cloud With Bitglass and AWS Global Accelerator

This post was originally published by Juan Lugo. Businesses’ IT infrastructures have undergone critical changes in the way that they store data and extend access to resources for users. Cloud, BYOD, and remote work have changed things forever. Where the flow of traffic is not optimized, business continuity is disrupted and an enterprise’s bottomline is adversely […]

Accelerating Security and the Cloud With Bitglass and AWS Global Accelerator

This post was originally published by Juan Lugo. Businesses’ IT infrastructures have undergone critical changes in the way that they store data and extend access to resources for users. Cloud, BYOD, and remote work have changed things forever. Where the flow of traffic is not optimized, business continuity is disrupted and an enterprise’s bottomline is adversely […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!