News (810)
AWS Hacked
According to CBR, hackers were able to infiltrate the Amazon Web Service.
A sophisticated hacker group pwned Amazon Web Services (AWS) servers, set up a rootkit that let them remotely control servers, then merrily funnelled sensitive corporate data home to its command and control (C2) servers from a range of compromised Windows and Linux machines inside an AWS data centre.
Read more...Etsy Moves to Clowd
Etsy continues its migration to the cloud, reports Tech Crunch.
Founded in 2005, Etsy was born before cloud infrastructure was even a thing. As the company expanded, it managed all of its operations in the same way startups did in those days — using private data centers. But a couple of years ago, the online marketplace for crafts and vintage items decided to modernize and began its journey to the cloud.
Read more...Cloud Tech Continues to Evolve
According to Forbes, there are many exciting cloud technologies on the horizon.
The rise of the cloud over the past few years has transformed business technology.
Read more...The Cloud is Light on Energy
Turns out the cloud isn’t a big energy hog like originally feared, reports the New York Times.
The computer engine rooms that power the digital economy have become surprisingly energy efficient.
Read more...Insurance in the Cloud
According to Forbes, insurers are taking their business to the cloud.
Insurers are looking to modernize their businesses—and fast. They recognize digitization has upended traditional business models and placed more information and decision-making power in the hands of insurance buyers.
Read more...Cloud Forensics Needs to Be Part of Cyber Security
Cloud forensics is often overlooked when companies are preparing their cybersecurity task force, reports Info Security.
The difference between traditional computer forensics and cloud forensics could not be starker. The cloud is becoming more widely used by companies across the globe, but few of these companies have included cloud forensics in their cyber-security investments.
Read more...Keep Data Safe in the Cloud
Cloud security posture management is the latest tool to help companies avoid highlevel security breaches in the cloud, reports CIO.
High-profile breaches have sparked interest in an emerging class of security software. The technology, named cloud security posture management (CSPM), scours cloud environments and alerts staff to configuration issues and compliance risks, most of which stem from human error.
Read more...Open Source & the Amazon Cloud
According to ZD Net, open source software creators are not always happy with Amazon cloud services.
Like many platform operators, Amazon has a love-hate relationship with those hosted on its platform. This is particularly true for open-source software creators, who see their products on offer on Amazon's cloud on terms they are not happy with.
Read more...Cloud Enables Security Threats
According to Dark Reading, cyberattacks from the cloud account for 44% of security threats.
Cloud-enabled cyberattacks are ramping up, as indicated in a new Netskope study that found 44% of security threats use cloud services in various stages of the kill chain.
Read more...Google Grabs Another One
Google has acquired Cornerstone Technology to boost its mainframe migration capabilities, reports Analytics Indie Mag.
In an undisclosed deal price, Google on Wednesday acquired Cornerstone Technology to assist big organizations in migrating their mainframe workload.
Read more...Most Read
-
-
Mar 25 2019
-
Written by News
-
-
-
Jan 24 2019
-
Written by Scott Koegler
-
-
-
Jan 06 2019
-
Written by Scott Koegler
-
-
-
Apr 08 2019
-
Written by Scott Koegler
-