We?ve all heard the concerns: While public clouds do a good job protecting our cloud-based systems from outside attackers, what about attacks that may come from other public cloud users? These are known as cross-tenant attacks (sometimes called side-channel attacks), where other tenants on the same public cloud somehow access your data. Should you pay more attention to this fear?
As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe.
The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption.
I?m one of those people who takes time at the new year to define personal objectives for the forthcoming year, some of which I actually achieve. Enterprise IT should be doing the same thing for cloud computing.
Enterprises are paying a lot more attention to the cloud these days?particularly to Amazon Web Services, which still leads the thinking in the public cloud. AWS?s Re:Invent conference is next month, and I expect to see three new types of cloud offerings emerge that will be of strong interest to enterprise.
It?s 6:00 a.m. on a Monday morning. You get an automated text from your security systems that a DDOS attack was attempted, but new security policies downloaded several hours earlier proactively protected the systems from the attacking IP address. All is well.
by Angela Guess According to a recent press release, ?CloudPassage, the leading cloud security automation provider, today announced a partnership with Sumo Logic, the leading cloud-native, machine data analytics platform. Through this integration, IT Ops, DevOps, and security teams can share a comprehensive, real-time view of their security and compliance postures while rapidly detecting and [?]