What security risks does rapid elasticity bring to the cloud?

Source – techtarget.com What are the security risks that may arise from cloud features such as measured services and rapid elasticity for platform as a service (PaaS) systems? One of the major benefits of anything living in the cloud is the ability to measure resources and use rapid elasticity to quickly scale as the environment demands. The days of being locked into physical hardware are over, and the benefits of rapid elasticity in cloud computing are attractive to many organizations. There are

Read more

Cloud Security Alliance aims to improve cyber security with introduction of new metrics

Source – cloudcomputing-news.net As any medical professional will explain, prevention is always better than cure. So why are so many organisations reactive instead of proactive when it comes to cybersecurity threats? A new report from the Cloud Security Alliance (CSA) aims to introduce new metrics for enterprises to improve their security game. The report, titled ‘Improving Metrics in Cyber Resiliency’, introduces Elapsed Time to Identify Failure (ETIF) and Elapsed Time to Identify Threat (ETIT), as well as processes to measure and

Read more

DevOps security has not caught up

Source – networksasia.net With the world’s fourth-largest internet population, Southeast Asia has in recent years become an attractive target for cybercriminals, their task made simpler by an underdeveloped system of data protection laws and weak adoption of cybersecurity best practices. The pace of innovation and rapid adoption of new technologies such as cloud and DevOps also pose further vulnerabilities for Southeast Asia. DevOps is the future, but organizations are not future-proof While seventy (70) percent state their organization plan to – or

Read more

Cyber Exposure : The Next Frontier for Security

Source – cso.com.au The stakes have never been higher when it comes to cybersecurity. Global cyber attacks such as the recent WannaCry ransomware attack is a sobering reminder that cybersecurity is the existential threat of this generation. A new report from Lloyd’s of London estimates a serious cyber attack could cost the global economy more than US $120 billion – as much as catastrophic natural disasters such as Hurricane Katrina and Sandy. According to the report, the most likely scenario is

Read more

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Source – securityintelligence.com Security is the primary focus of any government agency. One of the most obvious pitfalls of these agencies moving highly sensitive data to the cloud is that they surrender control to a third party. Moreover, nothing on the internet is truly secure, and all data is vulnerable to attacks and threats. The exposure footprint to those threats is staggering under the best of circumstances. For example, the complexity of mobile devices poses a significant challenge when it comes to cloud

Read more

5 Ways to Think About Cloud Security

Source – csoonline.com Cloud computing promises significant costs savings and more streamlined management of mission-critical information technology, data processing and storage needs. But is it secure? Vibrant Credit Union (VCU), a Midwestern-based full service financial services credit union that offers both online services and storefront branches, continues to grow their footprint in the cloud. As their needs grow, so does their emphasis on security. Steve McAtee, Vibrant’s CIO, has been tasked with migrating securely to the cloud without inflating the credit

Read more

How to tackle changing cloud security threats: A guide

Source – cloudcomputing-news.net IT workers face a serious challenge when it comes to file sharing. In one corner is corporate governance which seeks to protect businesses and prevent cyber-attacks. In the opposite corner are end users who want to work more efficiently – collaboratively – by sharing or saving files. The best way of ending this conflict is to find middle ground. In attempting this resolution, enterprises need to find the right balance between IT security and governance on one side

Read more

The latest cyber attacks show why the cloud is safer

Source – infoworld.com Computer systems from the Ukraine to the United States were affected last week by the Petya cyber attack. It’s similar to the recent WannaCry ransomware attack last month. The WannaCry ransomware took advantage of vulnerabilities in the older versions of Windows that allowed the infection to spread. All someone needed to do was click a malicious link and—bang!—they were infected. That is, if they hadn’t installed the patches and updates. These attacks are a reminder of why the cloud is a

Read more

Accelerate DevOps by Automating Security

Source – searchaws.techtarget.com DevOps teams are under enormous pressure to accelerate development cycles and improve quality assurance. We live in a world where IT consumerization is a fact of life and speed to market is not just an enormous competitive differentiator but an absolute necessity. This is why DevOps teams are embracing modern initiatives such as agile development, containers and microservices. Demands for speed and accuracy—along with the potential for cost savings—are also driving DevOps’ growing reliance on cloud services: DevOps

Read more

How to approach cloud computing and cyber security in 2017

Source – information-age.com The adoption of cloud computing has been on the up since as far back as 2008, when a survey conducted by the Pew Research Institute found that cloud services were used by nearly 69% of Americans. Since then, the industry has experienced hyper-growth and exceeded the already vast predictions of how big it would become. IDC predicts that the cloud computing market in 2017 will be worth $107 billion and, according to Gartner, by 2020 a corporate ‘no-cloud’

Read more
1 2