CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cloud
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cloud

Businessman holding virtual cloud show how to secure unstructured data in the cloud
Cyber SecurityInsights

Room to Grow: Four Areas to Consider for Securely Handling Unstructured Data in the Cloud

October 15, 2020
The cloud can provide better data security than traditional storage … when done correctly. How do you ensure your unstructured data remains secure and highly available? Read More
Man tapping on virtual gear mechanism showing security considerations for cloud migration
Cyber SecurityInsights

Top 5 Security Considerations for Cloud Migration

August 4, 2020
Cloud-based deployments have significantly changed the security paradigm and the foremost consideration for cloud migration involves a security framework that spans the entire cloud infrastructure. Read More
Engineer working in data center showing the ways to de-risk the data center
Cyber SecurityInsights

De-Risking the Data Center: Now’s the Time to Reflect on How We Use and Protect the Data Center

June 8, 2020
With data centers accounting for $400 billion of data breaches annually, companies should start thinking about de-risking the infrastructure by investing in cloud data management and people. Read More
Man holding a virtual padlock icon showing how SDP provides better protection when moving data into cloud
Cyber SecurityInsights

Data Protection Is Better with Software Defined Perimeters and Smart Endpoints

May 1, 2020
SDP helps companies to secure the connection when moving data into the cloud for disaster recovery by shifting perimeter defenses to the software of the DR application. Read More
Mechanics standing in front of jet engine showing the importance of data security while airline industry is transforming to cloud-based technologies
Cyber SecurityInsights

As the Airline Industry Looks to the Cloud, Data Security is Critical for Take Off

March 17, 2020
Security is one of the greatest concerns for organizations in the airline industry when adopting cloud-based technologies in their digital transformation. Read More
Modern graphic interface shows business information indicating cybersecurity trends
Cyber SecurityInsights

Cybersecurity Trends to Know in 2020

March 12, 2020
In this guide, we look at some of the cyber security trends and latest innovations that are helping companies to defend themselves against cyber attacks in 2020. Read More
A green leaf with a heart shape on a computer circuit board showing limited climate impact of cloud computing
Tech

Guilty of Netflix Binging? New Research Sheds Light on Climate Impact of Cloud Computing

March 9, 2020
Researchers have revealed that increase in cloud computing demands has little climate impact contrary to previous expectations as energy consumption by data centers has remained relatively low at about 1% of global energy consumption. Read More
Night view of MGM building showing cloud misconfiguration being the likeliest cause of MGM hotel leaks
Cyber SecurityNews

Cloud Misconfiguration Likeliest Cause of MGM Hotel Leaks

March 3, 2020
Based on new reports, last year’s MGM Resorts breach exposed personal data of more than 10.6 million guests with cloud misconfiguration suggested to be the likeliest cause. Read More
Man using mobile phone connecting to cloud network showing government agencies using cloud extraction tools as surveillance technology
Data PrivacyNews

Privacy International Report on “Cloud Extraction” Programs Sheds Light on Far-Reaching Government Surveillance Technology

January 20, 2020
New report shows government agencies are regularly using cloud extraction tools as surveillance technology to analyze and extract private data from major cloud services. Read More
Screen with binary codes showing how big data brings challenges beyond the capabilities of traditional SIEM
Cyber SecurityInsights

Big Data Brings Challenges Beyond the Capabilities of Traditional SIEMs

January 2, 2020
Big Data is revolutionizing how and why potential threats are detected, and demanding a substantial shift in next generation SIEM. Read More
Load More

Latest

Security camera lens showing end-to-end encryption feature for Ring products

Following a Year of Privacy Worries and Security Breaches, Ring Implements End-to-End Encryption

Finger pressing button on virtual screen showing cybersecurity trends

2021 Trends in Cybersecurity

Young adults on the couch using smartphones showing privacy policy update for WhatsApp

WhatsApp Clarifies New Privacy Policy Update, Says That Data Sharing With Facebook Will Be Limited To Communication With Businesses

Young man playing game at home showing gaming companies at risk due to stolen employee credentials

Stolen Employee Credentials Put Leading Gaming Companies at Risk of Severe Cyber Attacks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results