CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cloud
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cloud

A green leaf with a heart shape on a computer circuit board showing limited climate impact of cloud computing
Tech

Guilty of Netflix Binging? New Research Sheds Light on Climate Impact of Cloud Computing

March 9, 2020
Researchers have revealed that increase in cloud computing demands has little climate impact contrary to previous expectations as energy consumption by data centers has remained relatively low at about 1% of global energy consumption.
Read More
Night view of MGM building showing cloud misconfiguration being the likeliest cause of MGM hotel leaks
Cyber SecurityNews

Cloud Misconfiguration Likeliest Cause of MGM Hotel Leaks

March 3, 2020
Based on new reports, last year’s MGM Resorts breach exposed personal data of more than 10.6 million guests with cloud misconfiguration suggested to be the likeliest cause.
Read More
Man using mobile phone connecting to cloud network showing government agencies using cloud extraction tools as surveillance technology
Data PrivacyNews

Privacy International Report on “Cloud Extraction” Programs Sheds Light on Far-Reaching Government Surveillance Technology

January 20, 2020
New report shows government agencies are regularly using cloud extraction tools as surveillance technology to analyze and extract private data from major cloud services.
Read More
Screen with binary codes showing how big data brings challenges beyond the capabilities of traditional SIEM
Cyber SecurityInsights

Big Data Brings Challenges Beyond the Capabilities of Traditional SIEMs

January 2, 2020
Big Data is revolutionizing how and why potential threats are detected, and demanding a substantial shift in next generation SIEM.
Read More
Server racks in data centre showing the challenges of cloud security
Cyber SecurityInsights

Conquering the Cyber Security Challenges of the Cloud

December 31, 2019
Cloud computing has evolved rapidly and brought new risks to cloud security. Companies need to find ways to securely use multiple cloud services and applications.
Read More
Woman using tablet with cloud icon showing multi-cloud security as new number one IT challenge for businesses
Cyber SecurityNews

Multi-Cloud Security Is the New #1 IT Challenge for Businesses

December 13, 2019
New study finds multi-cloud security to be the biggest IT challenge for businesses as the authorization and authentication handoffs between the different services provide opportunity for things to go wrong.
Read More
Man holding tablet with cloud icon showing benefits, disadvantages and use cases of lift and shift cloud migration
Cyber SecurityInsights

Lift and Shift Cloud Migration: Benefits, Disadvantages and Use Cases

December 11, 2019
Lift and Shift is the cheapest and easiest cloud migration method. Organizations should consider the different application components and how they interact with each other to determine the best approach.
Read More
Keyhole on cloud icon showing cloud safety concerns raised over DDoS attack on Amazon web services
Cyber SecurityNews

DDoS Attack on Amazon Web Services Raises Cloud Safety Concerns

October 31, 2019
For nearly eight-hours, AWS DNS servers were hit by a sustained DDoS attack. The servers were essentially jammed such that their basic mitigations appeared to have little or no effect.
Read More
Cloud synchronization progress bar on laptop screen showing the issues on cloud storage security and how organizations can address them
Data ProtectionInsights

Cloud Storage Security Issues

July 31, 2019
Many SMBs are worried about cloud storage security when they move to the solution or increase the use due to the many benefits. What can be done to ensure their data remains safe?
Read More
Woman typing on keyboard with application icons around showing Chinese Cloud Hopper operation which targets tech providers for access to their customers’ intellectual property
Cyber SecurityInsights

Chinese Cloud Hopper Operation Targets Top Tech Providers in World

July 11, 2019
It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.
Read More
Load More

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results