Last year, cyber security breaches wreaked havoc on some of the biggest financial institutions, retailers and governments in the world, causing data and financial loss and even corporate embarrassment for a certain entertainment powerhouse. In 2016, we can likely expect more - more advanced attacks including targeted industry espionage, ransomware, and social engineering.
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
I was at the #Structure2017 conference and the term hybrid cloud (at last count a day and a half into a two-day conference) has been used 131 times. However – I hazard that between the panelists, interviewers or the audience members who used this term - all have different definitions interpretations of this catchphrase.
In Part I, I left you with a teaser about how a home moving dilemma is the state of the enterprise today for cloud migration. Let’s now dig into the challenges that CIOs and CSOs are facing today in their journey to the Hybrid Cloud.
Innovative healthcare technology solutions are raising serious security and privacy concerns. And that has to be addressed. It needs to start with patient advocacy and transparency. And stricter regulations that can be tested by the patients.
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs.
Migration to the cloud presents many unique challenges in protecting your data. Cloud Access Security Brokers (CASBs) can help protect corporate data while embracing cloud applications and services.
Personal information of over 80 million U.S. households was exposed from an unsecured cloud database, while the owner of the database remains unknown.
Edge computing eliminates latency and brings information closer to the location of where it is needed instead of far away servers, it provides performance benefit and gives the control of data privacy back to users.
2019 Sans Institute Cloud Security Survey Reveals Top Threats, Which Surprisingly Are Not DDoS Attacks
Recent cloud security survey shows that even though businesses have increased their awareness on security threats, 19% still experienced a data breach, with account hijacking being the top attack method.