Analysing security solutions in cloud computing technology

Source – cloudcomputing-news.net Ever more companies are proving that cloud computing continues to be a major trend in the IT field. For instance, IDC recently predicted that spending on public cloud services would reach $160 billion by the end of this year. When it comes to security, however, the same issues and concerns persist today as they did several years ago. Take any research report which asks about organisations’ concerns with cloud migration and security is usually the number one. What

Read more

4 experts predict what’s coming in 2018: DevOps, AI, and more

Source – jaxenter.com Predicting the future is a hard gig. For every right guess, there’s always an over-excited promise that falls short of reality. However, we’re taking a lot of the guesswork out of predicting what’s hot in 2018 by asking the experts what they think. While nothing is set in stone, it looks like 2018 is going to bring a lot of growth for DevOps, cloud technologies, and data science. However, signs are unclear for what will happen to artificial intelligence and

Read more

How to keep your data safe in the cloud

Source – theweek.com Cloud storage and cloud computing are booming. Worldwide public cloud service revenues are expected to grow by 18.5 percent in 2017 to a whopping $260 billion — and there’s no reason to think that pace will slow down any time soon. It’s not hard to see why business is booming. The cloud offers families a convenient way to store everything from pictures to documents, and provides individuals and businesses efficient new ways to work together, handle services such as payroll

Read more

DevSecOps is important and here is why

Source – appdevelopermagazine.com In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news. Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps and standard security practices. It attempts to prevent vulnerabilities that can occur at every step of the development process, and so,

Read more

Why we need to improve cloud computing’s security

Source – phys.org Do you often use Facebook? How about Snapchat, Gmail, Dropbox, Slack, Google Drive, Spotify or Minecraft? Perhaps all of them? Bottom line, if you use an online social network, e-mail program, data storage service or a music platform, you are almost certainly using cloud computing. Cloud computing is way of giving access to shared resources such as computer networks, servers, storage, applications and services. Individuals and organisations can place their data on the cloud and enjoy unlimited storage

Read more

What security risks does rapid elasticity bring to the cloud?

Source – techtarget.com What are the security risks that may arise from cloud features such as measured services and rapid elasticity for platform as a service (PaaS) systems? One of the major benefits of anything living in the cloud is the ability to measure resources and use rapid elasticity to quickly scale as the environment demands. The days of being locked into physical hardware are over, and the benefits of rapid elasticity in cloud computing are attractive to many organizations. There are

Read more

Cloud Security Alliance aims to improve cyber security with introduction of new metrics

Source – cloudcomputing-news.net As any medical professional will explain, prevention is always better than cure. So why are so many organisations reactive instead of proactive when it comes to cybersecurity threats? A new report from the Cloud Security Alliance (CSA) aims to introduce new metrics for enterprises to improve their security game. The report, titled ‘Improving Metrics in Cyber Resiliency’, introduces Elapsed Time to Identify Failure (ETIF) and Elapsed Time to Identify Threat (ETIT), as well as processes to measure and

Read more

DevOps security has not caught up

Source – networksasia.net With the world’s fourth-largest internet population, Southeast Asia has in recent years become an attractive target for cybercriminals, their task made simpler by an underdeveloped system of data protection laws and weak adoption of cybersecurity best practices. The pace of innovation and rapid adoption of new technologies such as cloud and DevOps also pose further vulnerabilities for Southeast Asia. DevOps is the future, but organizations are not future-proof While seventy (70) percent state their organization plan to – or

Read more

Cyber Exposure : The Next Frontier for Security

Source – cso.com.au The stakes have never been higher when it comes to cybersecurity. Global cyber attacks such as the recent WannaCry ransomware attack is a sobering reminder that cybersecurity is the existential threat of this generation. A new report from Lloyd’s of London estimates a serious cyber attack could cost the global economy more than US $120 billion – as much as catastrophic natural disasters such as Hurricane Katrina and Sandy. According to the report, the most likely scenario is

Read more

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Source – securityintelligence.com Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering under the best of circumstances. For example, the complexity of mobile devices poses a significant challenge when it comes to cloud

Read more
1 2 3