informa

Cloud

Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Mastering the Art of Cloud Tagging Using Data Science
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
January 17, 2022
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
by Keith Neilson, Technical Evangelist, CloudSphere
January 17, 2022
5 min read
Article
New Vulnerabilities Highlight Risks of Trust in Public Cloud
Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.
January 13, 2022
Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.
by Robert Lemos, Contributing Writer
January 13, 2022
4 min read
Article
New Cyberattack Campaign Uses Public Cloud Infrastructure to Spread RATs
An attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data.
January 12, 2022
An attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data.
by Kelly Sheridan, Senior Editor
January 12, 2022
5 min read
Article
Cloud Apps Replace Web as Source for Most Malware Downloads
Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.
January 11, 2022
Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.
by Jai Vijayan, Contributing Writer
January 11, 2022
4 min read
Article
MSP Thrive Acquires InCare Technologies
Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.
January 07, 2022
Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.
January 07, 2022
2 min read
Article
CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps
A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.
January 06, 2022
A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.
by Robert Lemos, Contributing Writer
January 06, 2022
5 min read
Article
Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation
Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.
January 06, 2022
Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.
by Dr. Nandish Mattikalli, Chief Engineer, BAE Systems Intelligence Solutions
January 06, 2022
5 min read
Article
Google Buys Siemplify to Get Ahead in Cloud Security
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
January 04, 2022
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
by Robert Lemos, Contributing Writer
January 04, 2022
5 min read
Article
Palo Alto Networks Appoints Helmut Reisinger to Leadership Team
Reisinger joins as CEO, EMEA and Latin America, to accelerate global growth strategy.
January 04, 2022
Reisinger joins as CEO, EMEA and Latin America, to accelerate global growth strategy.
January 04, 2022
4 min read
Article
Log4j Reveals Cybersecurity's Dirty Little Secret
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
December 22, 2021
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
by Mark Manglicmot, Vice President of Security Services, Arctic Wolf
December 22, 2021
6 min read
Article
Preemptive Strategies to Stop Log4j and Its Variants
Zero trust is key to not falling victim to the next big vulnerability.
December 21, 2021
Zero trust is key to not falling victim to the next big vulnerability.
by Oded Gonda, VP of Technology & Innovation, Check Point Software Technologies
December 21, 2021
4 min read
Article
Brillio Acquires Cedrus Digital to Strengthen Their Digital Transformation Service Capabilities
The acquisition of Cedrus Digital, with its consulting-led model and over 150 cloud, data and product engineers, primarily in the United States, will further augment Brillio’s nearshore digital transformation capabilities offered for Fortune 500 clients.
December 20, 2021
The acquisition of Cedrus Digital, with its consulting-led model and over 150 cloud, data and product engineers, primarily in the United States, will further augment Brillio’s nearshore digital transformation capabilities offered for Fortune 500 clients.
December 20, 2021
4 min read
Article
Lights Out: Cyberattacks Shut Down Building Automation Systems
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
December 20, 2021
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
by Kelly Jackson Higgins, Executive Editor
December 20, 2021
9 min read
Article
Log4Shell: The Big Picture
A look at why this is such a tricky vulnerability and why the industry response has been good, but not great.
December 16, 2021
A look at why this is such a tricky vulnerability and why the industry response has been good, but not great.
by Richard Ford, Chief Technology Officer, Praetorian
December 16, 2021
5 min read
Article