Top

Tag: security


Infrastructure as a service (IaaS), Service Models

Infrastructure-as-a-Service Security Responsibilities

November 19, 2020

Via: Cloud Tweaks

It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical […]


Global Cloud

14 controls for securing SAP systems in the cloud

October 29, 2020

Via: CSO Online

On-premises SAP deployments are notoriously complex with extensive customer customizations to the point where even making configuration changes for security reasons might require months-long planning and testing to make sure they break nothing in the environment. As more companies move […]


Service Models, Software as a service (SaaS)

Remote working world reveals cloud/SaaS security concerns

September 29, 2020

Via: Computer Weekly

With the number of employees working from home or other remote locations skyrocketing, there has been a huge rise in the use of cloud applications and services and, according to research from Enea, a commensurate increase in risky behaviours and […]


Global Cloud

Cloud technology great for security but poses systemic risks, according to new report

August 31, 2020

Via: CSO Online

Although nearly 30 years old, cloud computing is still a “new” technology for most organizations. The cloud promises to reduce costs and increase efficiencies through storage and management of large repositories of data and systems that are theoretically cheaper to […]


Service Models, Software as a service (SaaS)

Cisco’s integrated security portfolio for cloud, email, and network simplifies and secures more

August 11, 2020

Via: CASB and Cloud Cybersecurity Solutions

It’s a pervasive fact of life these days that, while your employees, your customers, and your data may be everywhere, your cybersecurity operations team simply can’t do the same. The pervasive use of SaaS applications, an increasingly remote and roaming […]


Deployment Models, Global Cloud, Public Cloud

Security teams struggle to keep pace with cloud threats

August 10, 2020

Via: Computer Weekly

Misconfiguration, unauthorised access and account hijacking are the most pressing of a number of threats to public cloud environments, which are now reaching a level where security operations are finding it more and more of a challenge to keep up, […]


Global Cloud

Google Cloud steps up security and compliance for applications, government

July 14, 2020

Via: CSO Online

Google is taking important steps to secure customer data in the cloud when used by applications and prevent potentially unauthorized access to sensitive computing workloads run by government institutions and their contractors. To meet the strict security and compliance requirements […]


Cloud Clients, Global Cloud

7 Security and Compliance Considerations for Cloud-Based Business Applications  

July 7, 2020

Via: Cloud Tweaks

There’s no doubt on-premises deployments of mission-critical business applications provide more control over data as it resides within the four walls of an organization’s network infrastructure. However, businesses can no longer ignore the benefits of moving these applications to the […]


Global Cloud

Microsoft’s Project Freta: This new free service spots rootkits lurking in cloud VMs

July 7, 2020

Via: ZDnet

Microsoft has unveiled Project Freta, a potential future virtual-machine (VM) forensics service that will allow anyone to automatically ferret out malicious software hiding in memory on cloud infrastructure. But unlike Microsoft’s commercial security services and innovations for Microsoft Defender Advanced […]


Global Cloud

Microsoft is buying CyberX to bolster its Azure IoT security

June 22, 2020

Via: Network World Cloud Computing

Microsoft has announced it will purchase the industrially focused network security vendor CyberX for an undisclosed sum in an effort to bolster the security capabilities of its Azure IoT platform. The acquisition strikes at the heart of two key IIoT […]