Page 57«..1020..56575859..7080..»

Category Archives: Cloud Computing

Alibaba launches new server chip to boost its cloud business in challenge to Amazon and Microsoft – CNBC

Posted: October 19, 2021 at 10:16 pm

Signage at the Alibaba Group Holdings Ltd. headquarters in Hangzhou, China, on Wednesday, March 24, 2021.

Qilai Shen | Bloomberg | Getty Images

GUANGZHOU, China Chinese e-commerce giant Alibaba launched a new server chip on Tuesday, as it looks to boost its cloud computing business and compete against U.S. rivals like Amazon.

The processor, called Yitian 710, will go into new servers called Panjiu.

The chip and servers will not be directly sold to customers. Instead, Alibaba's cloud computing clients will buy services based on these latest technology. These servers are designed for artificial intelligence applications and storage.

The company did not say when the services based on the latest chip and server will be available for customers.

Alibaba will not be manufacturing the semiconductor but will be designing it instead.

That's a trend among Chinese companies. Huawei designed its own smartphone chips and Baidu raised money this year for a standalone semiconductor business. U.S cloud computing rivals including Google and Amazon have also done the same.

See the original post:

Alibaba launches new server chip to boost its cloud business in challenge to Amazon and Microsoft - CNBC

Posted in Cloud Computing | Comments Off on Alibaba launches new server chip to boost its cloud business in challenge to Amazon and Microsoft – CNBC

19 Cloud Computing Statistics That Will Keep You Awake at Night – Hashed Out by The SSL Store

Posted: at 10:16 pm

Cloud adoption rates are increasing by the day as more businesses take advantage of everything the cloud has to offer. But along with the benefits the cloud offers, it also brings increasing security risks. Heres a list of 19 cloud adoption and security statistics you should know in 2021 and beyond

As kids, its fun to lay outside with family or friends and stare up at the sky. You look for fun and exciting shapes and characters in the clouds. But as adults, particularly those working in IT security for enterprises, we look to clouds in a different way both as a source of scalable storage and as a means of delivering services in our digital world. This is particularly true when it comes to increasing remote work requirements since Covid-19 first reared its ugly head nearly two years ago.

However, as you know, the cloud has its ups and downs when it comes to security and usages. Thats why weve put together a list of 19 attention-grabbing cloud computing statistics this will cover data relating to cloud adoption, cloud security, and other informative statistics.

Lets hash it out.

When it comes to cloud adoption, you must decide whether its better for your business to use a single cloud provider or work with multiple cloud providers. Part of this decision entails choosing whether to use in-house resources (on-prem), cloud, or perhaps a hybrid approach.

Theres no right or wrong answer that decision is something you must determine the answer to based on factors that include your budget, needs, and in-house resources (including personnel).

Data from Flexeras 2021 State of the Cloud Report shows that nine in 10 enterprises are taking a multi-cloud strategy approach. Within that group, more than 80% of enterprises report having a hybrid cloud strategy in place.

Organizations that have multi-cloud strategies are less likely to be dependent upon individual vendors. Gartners 4 Trends Impacting Cloud Adoption in 2020 report shows that by 2024, nearly two in three organizations will use more than one vendor.

Furthermore, data from a separate Gartner survey also shows that 81% of public cloud users currently use two or more cloud providers. However, their research also predicts that 50% of the public cloud market will be controlled by the 10 biggest providers by 2023.

Every day, the cloud is playing a larger role in organizations operations and services, and businesses are increasingly turning to PKI to provide identity and security. In their 2021 State of Machine Identity Management report, Keyfactor and the Ponemon Institute report that more than half of organizations report cloud-based services as the impetus for public key infrastructure deployment and usage growth rates. This is followed by:

Cynets 2021 Survey of CISOs with Small Cyber Security Teams shows that companies with smaller security teams are looking primarily to the cloud (57%) as a means of implementing security technologies. This top-ranking priority is followed by on-prem (21%) and hybrid (13%).

By outsourcing resource-intensive processes like managing in-house IT infrastructure, companies can free up their limited personnel to focus on other priorities.

Whether its the cost of running servers or having the personnel in place to manage them, everything costs money and prices are increasing. With this in mind, lets explore some of the cloud computing-related costs for businesses.

Data from Proofpoint and the Ponemon Institutes report The Cost of Cloud Compromise and Shadow IT shows that security incidents cost businesses a pretty penny. Their survey of 662 U.S. IT and IT sec professionals shows that cloud account compromises cost an average of more than $6.2 million over 12 months. 86% of the surveyed organizations said cloud account compromises cost them at least $500,000.

To put this into context, the cost of cloud account compromises averages out to be 3.5% of their total revenues within the same period.

Cloud migration can cost a pretty penny, but not all organizations properly plan for the expenses. While organizations often plan for the direct costs associated with this process, planning for indirect costs can fall through the cracks. As such, Gartners cloud migration cost research predicts that almost two in three infrastructure and operations (I&O) leaders through 2024 will experience public cloud migration cost overruns that will take a toll on their on-prem budgets.

Flexera reports in their 2021 State of the Cloud Report that 30% of the organizations they surveyed have annual public cloud spends ranging between $2.4 million and $12 million. Another 31% of their survey respondents indicate they spent more than $12 million a year!

Based on the estimate of $12 million a year, that means these large organizations are spending an average of $32,876.72 a day on public cloud.

$50 million thats more money than some business owners will ever see in their entire lifetimes. But according to research from IDC and the cloud infrastructure security company Ermetic, that number is just the annual cloud infrastructure expenses for some companies. Their research also shows that 71% of businesses invest up to $50 million a year to expand their cloud infrastructures.

Cloud security is integral to your organizations overall security health. Lets explore some relevant cloud security statistics and data to give you a better view of what this sector of the industry looks like.

Would you believe me if I told you that nearly all organizations have experienced a cloud data breach within the previous year and a half? Data from IDC and Ermetic shows that almost all the organizations (98%) they surveyed experienced a minimum of one cloud data breach in that period. Their study involved 200 CISOs and other security decision-makers from U.S. companies.

The report indicates that this rose nearly 20% from their 2020 survey in which only 79% of respondents indicated the same.

In early 2021, Keyfactor hired the Ponemon Institute to conduct a survey of 100 North American IT security execs to better understand their zero-trust strategy priorities and where public key infrastructure fits in:

Verizons 2021 Data Breach Investigations Report (DBIR) shows that servers lead the way in terms of being the top assets targeted in data breaches. Web application servers took the lead as the primary breach target, encompassing more than 50% of breaches; mail servers came in second with ~25% of data breaches targeting them.

Compromised external cloud assets were more common than on-premises assets in both incidents and breaches. Conversely, there was a decline of user devices (desktops and laptops) being compromised. This makes sense when we consider that breaches are moving toward Social and Web application vectors, such as gathering credentials and using them against cloud-based email systems. Verizon 2021 DBIR Executive Brief

More than 50% of the web app attack-based data breaches Verizon analyzed in their 2021 Data Breach Investigations Report (DBIR) involve mail server compromises. Of those compromised, the overwhelming majority (96%) were cloud-based mail servers.

Data from IBM and the Ponemon Institutes 2021 Cost of a Data Breach report shows that the average cost of a data breach for a hybrid cloud environment is $3.61 million. This average cost is less than other cloud environments (i.e., on-prem, private, and public clouds). The average total cost of a data breach for businesses globally was $4.24 million.

IBMs 2021 Cost of a Data Breach report shows that cloud misconfigurations were the third most common initial attack vector in the breaches they analyzed. These types of data breaches require an average of 186 days to identify and another 65 to contain. The price tag accompanying this attack vector? A cool $3.86 million in total costs.

Needless to say, these types of cloud security statistics underscore the importance of having strong security measures, processes, and policies in place. Having these resources in place can help you avoid oops situations that put your company, data, and reputation at risk.

Its no secret that security misconfigurations are a big issue for businesses. But Palo Altos Unit 42 2H 2020 research indicates that two in three security-related incidents are due to misconfigurations. But thats still lower than estimates from Gartner, which estimates that 99% of cloud security failures through 2025 will be the customers fault pointing to the idea that misconfigurations are a much bigger issue.

Palo Altos Unit 42 Cloud Threat Report 1H 2021 data shows that nearly one in three organizations fail to implement proper security measures in the cloud. These controls are what help to protect cloud environments against attacks and mitigate vulnerabilities.

Access security measures are the locks on your doors and the walls around your castle. But data from IDC and Ermetic shows that access-related vulnerabilities cause four in five cloud data breaches. The top-ranking industries? Healthcare, Utilities, and Media.

Overall, their report also shows that larger companies are more at risk of experiencing these security issues than businesses with fewer employees. (60% of businesses with 10,000 or more employees cite access as their leading factor for causing cloud breaches.) This makes sense, considering that they have much larger attack surfaces than their smaller business counterparts.

Before we jump into the data, ask yourself: what types of data are you storing in the cloud? And what steps are you taking to ensure that data remains secure?

When it comes to cloud storage, organizations store everything from employees and customers sensitive information to intellectual property and trade secrets. Lets explore some key cloud computing and usage statistics relating to stored data.

Frankly, storing sensitive data in the cloud is always risky this is why companies that choose to do so need to take extra precautions in terms of how they secure that data. According to SANs 2021 Cloud Security Survey data from a presentation sponsored by Blue Hexagon, the top three types of sensitive or regulated data that companies store include:

Flexeras 2021 State of the Cloud Report data shows that almost half of enterprises workloads (47%) and data (44%) are currently stored in public cloud environments. These organizations aim to add another 8% and 7%, respectively, to the cloud within the following 12 months.

Compare this to SMB respondents, who say they have 64% of workloads and 59% of data in the public cloud now, and that they plan to add another 5% of workloads and 8% of data within 12 months.

Its obvious youre in a rush if youve skipped right to this section. As such, weve put together a brief highlights list of the top five cloud computing statistics to note from the list above:

As always, feel free to leave a comment and share your most notable cloud security statistics and cloud computing statistics below

See original here:

19 Cloud Computing Statistics That Will Keep You Awake at Night - Hashed Out by The SSL Store

Posted in Cloud Computing | Comments Off on 19 Cloud Computing Statistics That Will Keep You Awake at Night – Hashed Out by The SSL Store

The Global Healthcare Cloud Computing Market is expected to grow by $ 33.49 bn during 2021-2025, progressing at a CAGR of 23.18% during the forecast…

Posted: at 10:16 pm

Global Healthcare Cloud Computing Market 2021-2025 The analyst has been monitoring the healthcare cloud computing market and it is poised to grow by $ 33. 49 bn during 2021-2025, progressing at a CAGR of 23.

New York, Oct. 18, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Healthcare Cloud Computing Market 2021-2025" - https://www.reportlinker.com/p02779355/?utm_source=GNW 18% during the forecast period. Our report on the healthcare cloud computing market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors.The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by increasing cloud-assisted medical collaborations and integrated service offerings for healthcare. In addition, Increasing cloud-assisted medical collaborations is anticipated to boost the growth of the market as well.The healthcare cloud computing market analysis includes the product segment and geographic landscape.

The healthcare cloud computing market is segmented as below:By ProductSaaSIaaSPaaSBy GeographyNorth AmericaEuropeAPACSouth AmericaMEAThis study identifies the increased number of cloud vendorsas one of the prime reasons driving the healthcare cloud computing market growth during the next few years.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our report on healthcare cloud computing market covers the following areas:Healthcare cloud computing market sizingHealthcare cloud computing market forecastHealthcare cloud computing market industry analysisThis robust vendor analysis is designed to help clients improve their market position, and in line with this, this report provides a detailed analysis of several leading healthcare cloud computing market vendors that include Allscripts Healthcare Solutions Inc., Amazon.com Inc., athenahealth Inc., Carestream Health Inc., General Electric Co., International Business Machines Corp., Microsoft Corp., Oracle Corp., Salesforce.com Inc., and Siemens AG. Also, the healthcare cloud computing market analysis report includes information on upcoming trends and challenges that will influence market growth. This is to help companies strategize and leverage all forthcoming growth opportunities.The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to an analysis of the key vendors.

The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters such as profit, pricing, competition, and promotions. It presents various market facets by identifying the key industry influencers. The data presented is comprehensive, reliable, and a result of extensive research - both primary and secondary. Technavios market research reports provide a complete competitive landscape and an in-depth vendor selection methodology and analysis using qualitative and quantitative research to forecast the accurate market growth.Read the full report: https://www.reportlinker.com/p02779355/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Story continues

See the article here:

The Global Healthcare Cloud Computing Market is expected to grow by $ 33.49 bn during 2021-2025, progressing at a CAGR of 23.18% during the forecast...

Posted in Cloud Computing | Comments Off on The Global Healthcare Cloud Computing Market is expected to grow by $ 33.49 bn during 2021-2025, progressing at a CAGR of 23.18% during the forecast…

Budget, Cybersecurity Are Barriers to State Cloud Adoption – Government Technology

Posted: at 10:16 pm

Cloud services made their first appearance on the National Association of State Chief Information Officers (NASCIO) list of state CIOs top 10 priorities in 2010, and the way governments approach cloud has come a long way in that time. In the past several years, there was a shift away from a gung-ho cloud first strategy to what many CIOs called cloud smart, and while IT leaders still see cloud as the way forward, theyre taking a measured approach.

At the NASCIO Annual Conference in Seattle last week, former Texas CIO Todd Kimbriel presented the results of a new study from NASCIO and Accenture that examined where states are in cloud adoption 89 percent of survey respondents reported that a hybrid cloud is their ultimate goal and what challenges theyre encountering on the way.

One major barrier Kimbriel brought up was budgeting, which Pennsylvania CIO John MacMillan said comes from the difference between consumption of cloud services, which is elastic, and budget, which is not; state budget cycles complicate that further.

Plus, MacMillan noted, moving to the cloud doesnt necessarily save money, since CIOs have to think of the transition costs in addition to longer-term financial impacts.

Another sticking point the study found in cloud adoption was inconsistency in terms of how states define what the cloud actually is. Forty percent of respondents reported that they use the NIST definition of cloud computing, while 20 percent said they use the term to refer to any off-premise computing.

Language matters, especially when it comes to cybersecurity, Sloan said. If we dont agree on what a cloud is when data is sitting out there, we now have shared risk.

Interestingly, the survey showed that while CIOs feel the cyber workforce is suitably trained to move a substantial portion of government services into the cloud, cybersecurity is still cited as a barrier to cloud adoption. This issue came up at another session at the NASCIO conference, where former Colorado CISO Deb Blyth said that whether cloud increases or reduces security risk depends on how its configured.

She cited faulty configuration as a factor in the 2017 cyber attack on the Colorado Department of Transportation, when an on-premise service was connected to the cloud as a test, opening an external line for bad actors to exploit. If state IT had been able to detect what was in the cloud, Blyth said, they could have more easily prevented the attack.

Washington CISO Vinod Brahmapuram predicted that, along with adaptive automation and trust in identity and access management, one major area where state CIOs will see a shift in the coming years is around well-architected cloud options that dont compromise security.

Lauren Harrison is the managing editor for Government Technology magazine. She has a degree in English from the University of California, Berkeley, and more than 10 years experience in book and magazine publishing.

See more here:

Budget, Cybersecurity Are Barriers to State Cloud Adoption - Government Technology

Posted in Cloud Computing | Comments Off on Budget, Cybersecurity Are Barriers to State Cloud Adoption – Government Technology

Cloud Computing Data Center IT Asset Disposition (ITAD) Market| Global Industry Analysis, Segments, Top Key Players, Drivers and Trends to 2028 Asset…

Posted: at 10:16 pm

The Global Cloud Computing Data Center IT Asset Disposition (ITAD) Market Analysis To 2028 is a specialized and in-depth study of the industry with a special focus on the global market trend analysis. The Cloud Computing Data Center IT Asset Disposition (ITAD) market report aims to provide an overview of the Cloud Computing Data Center IT Asset Disposition (ITAD) market with detailed market segmentation by type, application, and geography. The global Cloud Computing Data Center IT Asset Disposition (ITAD) market is expected to witness high growth during the forecast period. The report provides key statistics on the market status of the leading Cloud Computing Data Center IT Asset Disposition (ITAD) market players and offers key trends and opportunities in the market.

Get Sample Copy @ https://www.qyreports.com/request-sample/?report-id=101040

The major players covered in Cloud Computing Data Center IT Asset Disposition (ITAD) Markets: Asset Management Ireland Ltd., Iron Mountain Recycling LLC, CloudBlue Technologies Inc., eRecoEMEA Corp. Ltd., Apto Solutions, Arrow Electronics Inc., es-Amm, Sims Recycling, ITRenew Inc.

COVID-19 Impact Analysis:

COVID-19 pandemic is an incomparable worldwide public health emergency that has impacted almost every industry. As a result, the long-term effects estimated to hamper the growth of the industry during the predicted period. Our research report is offering important insights on the pandemic considering the modifications in consumer behavior, growth demand, current market dynamics, and the vital interventions of governments. The updates study on the global Cloud Computing Data Center IT Asset Disposition (ITAD) market offers systematic analysis, estimations, and forecast details, determining the COVID-19 impact on the Cloud Computing Data Center IT Asset Disposition (ITAD) market.

Research Methodology while conducting the study of Global Cloud Computing Data Center IT Asset Disposition (ITAD) Market

Primary research-

Our primary research efforts include reaching out Cloud Computing Data Center IT Asset Disposition (ITAD) industry participants through mail, tele-conversations, referrals, professional networks and face-to-face interactions. We are also in professional corporate relations with various companys discussions

Secondary research-

Our analyst refers a broad array of Cloud Computing Data Center IT Asset Disposition (ITAD) industry sources for our secondary, which typically include; however, not limited to: Cloud Computing Data Center IT Asset Disposition (ITAD) industry Company SEC filings, annual reports, company websites, broker & financial reports and investor presentations for competitive scenario and shape of the industry

Ask for Discount: https://www.qyreports.com/ask-for-discount/?report-id=101040

Geographic Segment Covered in the Report:

The Cloud Computing Data Center IT Asset Disposition (ITAD) report provides information about the market area, which is further subdivided into sub-regions and countries/regions. In addition to the market share in each country and sub-region, this chapter of this report also contains information on profit opportunities. This chapter of the report mentions the market share and growth rate of each region, country and sub-region during the estimated period.

The report offers following vital benefits to Industry participant & stakeholders:

Enquiry before Buying this premium Report: https://www.qyreports.com/enquiry-before-buying/?report-id=101040

Note: If you have any special requirement, please let us know and we will offer you the report as you want.

Seeking to initiate a fruitful business relationship with you!

Contact Us:

Name: Jones John

Contact number: +1-510-560-6005

204, Professional Center,

7950 NW 53rd Street, Miami, Florida 33166

[emailprotected]

http://www.qyreports.com

Read the rest here:

Cloud Computing Data Center IT Asset Disposition (ITAD) Market| Global Industry Analysis, Segments, Top Key Players, Drivers and Trends to 2028 Asset...

Posted in Cloud Computing | Comments Off on Cloud Computing Data Center IT Asset Disposition (ITAD) Market| Global Industry Analysis, Segments, Top Key Players, Drivers and Trends to 2028 Asset…

4 Things You Need to Know Now About Edge Computing – TechTarget

Posted: at 10:16 pm

Edge computing is one of the most important trends in IT. By 2023, more than half of new enterprise IT infrastructure will be at the edge, according to IDC.1 By 2025, Gartner predicts 75% of enterprise-generated data will be created and processed outside a traditional data center or cloud.2

Despite this significant shift, however, many IT and business leaders are early in the process of defining how edge complements their overall cloud strategy. According to exclusive research by Hewlett Packard Enterprise, many organizations are just beginning to realize the potential of edge initiatives through pilot projects and proofs of concept.

To help you move forward in your edge journey, this article defines four important factors to keep in mind.

Factor No. 1: Cloud and edge are complementary.One of the common myths about the edge is that it will somehow displace cloud computing. In reality, edge and cloud should work hand in hand. The smart strategy assumes synchronization between a decentralized edge and a centralized cloud. With the cloud, whether public, hybrid or private, you have a platform to centralize all your data and leverage it where and when needed across the entire enterprise.

The edge allows you to maximize the value of your data with speed and insight. With the edge, you can send data to the cloud and retrieve it quickly, or better yet, you can leverage it where it is created. This generates incremental value for applications and use cases that gain advantage from real-time analytics, internet of things (IoT) devices and rapid decision-making. You can make time-sensitive decisions on site, using real-time data. You can minimize the costs for transporting raw data and enable applications and use cases where data cant be sent off site, for security, compliance or other reasons.

Factor No. 2: Many innovative use cases derive from IoT convergence and integration.While edge use cases are diverse, the benefits consistently center on creating the operational efficiencies and speed that can drive new and transformative business models for competitive differentiation. Such use cases include monitoring and threshold alerts; predictive maintenance and machine-to-machine automation; remote learning and training; and in-hospital and home health monitoring. The possibilities are endless, fueling demand for edge computing technology at a projected compound annual growth rate of 38.4% from 2021 to 2028, according to Grand View Research.3

Examples of real-world use cases from HPE customers include:

See related article: Texmark: Where Digital Transformation Never Stops

Factor No. 3: Edge innovation requires a cohesive data strategy to scale.A successful edge strategy begins with a cohesive plan for managing the data and infrastructure. The massive amount of data being generated outside the data center is the key factor accelerating the need for edge computing. Not all of the data can or should be stored and forwarded. Without a comprehensive data strategy, you run the risk that your data capture will quickly outpace your ability to drive business insights.

One important factor is to leverage solutions that can manage data holistically from creation to deletion. That means using automated and data-centric policies that eliminate silos and unify workflows across the data lifecycle, wherever the data residesfrom the data center to the edge to the cloud.

See related article: Three Ways to Beat the Complexity of Storage and Data Management to Spark Innovation

Factor No. 4: Networking is core to a successful edge strategy. The need to reduce latency and improve resiliency has been a vital factor in the rise of edge computing. Now, with the growth of IoT and the shift to more IT infrastructure at the edge, the role of the network is taking on even greater importance, with a focus on wired and wireless networks and factors such as speed, capacity, bandwidth, throughput, resiliency and reduced latency.

More edge-enabled applications and use cases will require the processing and analysis of data in real time to address performance issues and limit bandwidth-related costs. The focus on network performance and bandwidth will become only more pronounced in the future, as more applications leverage machine learning and artificial intelligence to deliver value to and from the edge.

Taking the Next StepSuccessful edge computing requires well-considered architecture and implementation planning, which is made even more complex due to the decentralized nature of edge. With numerous sites collecting and analyzing data and the immediacy of decision-making, it is difficult to create a one-size-fits-all model.

Working with a trusted partner is one of the surest ways to gain a competitive edge anywhere on your edge journey. To learn how HPE can help your organization develop and implement your edge-to-cloud roadmap, please review the articles on this site and visit HPE atHPE.com/Edge.

1 Edge Computing: Not All Edges Are Created Equal, IDC, June 1, 20202 Computing on the Edge Can be TransformativeBut Look Before You Leap, Forbes, March 15, 20213 Edge Computing Market Size, Share and Trends Analysis Report, Grand View Research, May 2020

Read the original post:

4 Things You Need to Know Now About Edge Computing - TechTarget

Posted in Cloud Computing | Comments Off on 4 Things You Need to Know Now About Edge Computing – TechTarget

Cloud Security Should Be the CEOs Wheelhouse Too – ETF Trends

Posted: at 10:16 pm

Cybersecurity is hot on the minds of corporations as the workforce is still partially digitally based, as are the security concerns that this situation creates. Increasing ransomware attacks and generalized hacking continue to be on the rise, creating an environment in which businesses of all sizes need to ensure that they have firm protections in place within digital spaces.

In an article for Entrepreneur, Stu Sjouwerman, founder and CEO of KnowBe4, a platform that offers security awareness training as well as simulated phishing, argues that CEOs need to be the driving force for cybersecurity within their cloud systems. CEOs should be knowledgeable and involved in the day-to-day operations of the IT department when it pertains to cloud security.

CEOs are mostly responsible for directing their businesses and understanding the threats that they might face. In an increasingly digital world, this responsibility has extended into cloud operations; CEOs should understand the risks of digital security and also the plans in place for mitigating those risks, Sjouwerman argues. This includes having the right technology and hiring the right personnel.

With the average cost of ransomware attacks hitting $761,000 in 2020, according to cybersecurity firm Sophos, a successful ransomware attack could set a business back for years or bankrupt it entirely.

CEOs need to ensure that they understand how their companies are being protected, as the companies reputations and financial standings are at stake. A CEO should have their CISO reporting to them directly, Sjouwerman explains, so that the CEO is informed, up-to-date, and able to help steer the company in directions that will allow it to continue to stay on the front edge of cybersecurity.

A CEO should also be up-to-date on the latest cloud technologies and any advancements within the rapidly growing industry to ensure that their company always has the best cloud technology for their particular business model.

The reality today is that cybersecurity absolutely has to be front and center for C-level execs, and that failure to make ityourissue brings substantial risk to your organization, Sjouwerman says of CEOs.

Cloud computing continues to profit and have exponential growth opportunities as the world becomes increasingly more digital. With this months focus on cybersecurity, the importance of cloud computing technologies that are reliable and protected is a priority for every aspect of a business and its leadership, all the way up to the CEO.

TheWisdomTree Cloud Computing Fund (WCLD)provides investors pure-play exposure to companies that provide cloud-based software.

WCLD tracks the BVP Nasdaq Emerging Cloud Index, an equally weighted index comprised of companies that derive the majority of their revenue from software provided via the cloud. That could mean remote delivery or a cloud-based business model that is subscription-, transaction-, or volume-based.

WCLD offers multi-cap exposure to emerging, fast-growing companies within cloud software and services. Holdings includeAsana Inc. (ASAN)at 2.49%,Bill.com Holdings Inc (BILL)at 2.27%, andCloudflare Inc at 2.25%.

WCLD has an expense ratio of 0.45%.

For more news, information, and strategy, visit theNasdaq Portfolio Solutions Channel.

See more here:

Cloud Security Should Be the CEOs Wheelhouse Too - ETF Trends

Posted in Cloud Computing | Comments Off on Cloud Security Should Be the CEOs Wheelhouse Too – ETF Trends

Lookout Named a Global Leader for Cloud Security Service in the 2021 Stratus Cloud Computing Awards – WDBJ7

Posted: at 10:16 pm

Published: Oct. 14, 2021 at 1:46 PM EDT

SAN FRANCISCO, Oct. 14, 2021 /PRNewswire/ --Lookout Inc., the leader in endpoint-to-cloud security, today announced that the Lookout Security Platform has been awarded a 2021 Stratus Award for Cloud Computing in the Cloud Security Service category. The Business Intelligence Group's annual Stratus Award program identifies companies, products and people offering unique solutions that take advantage of cloud technologies.

Security perimeters have become obsolete as people use mobile devices and cloud applications to work from anywhere. The Lookout Security Platformis a Secure Access Service Edge (SASE) solution that's tailor-made for the future of work. It provides organizations with complete visibility across their entire infrastructure, from mobile endpoints through cloud infrastructure and applications. With the integrated insight, the platform dynamically enforces Zero Trust security policies based on both the continuous risk assessment of endpoints and users, and the sensitivity of the data they are accessing.

By integrating Secure Web Gateway, Cloud Access Security Broker and Zero Trust Network Access capabilities with Endpoint Protection and Endpoint Detection and Response into a cloud-native platform, IT security policies for access and data classification can be written once and applied to all traffic passing through the single proxy. The platform also natively delivers Data Loss Prevention, User and Entity Behavior Analytics, Anti-virus/Anti-malware and Enterprise Digital Right Management to protect data from endpoint to cloud.

"We're proud to see the Lookout Security Platform recognized for its industry-leading capabilities by the Stratus Awards," said David Richardson, Vice President of Product, Lookout. "The core of our technology is about securing data no matter where your employees work. With an integrated platform, we give organizations complete visibility and insights into everything so they can make smart Zero Trust access decisions."

"Lookout is at the forefront of the cloud helping to drive practical innovations in the cloud," said Maria Jimenez, Chief Nominations Officer of Business Intelligence Group. "The cloud is now part of the fabric of our personal and professional lives and we are thrilled that our volunteer judges were able to help promote all of these innovative services, organizations and executives."

To learn more about the Lookout Security Platform, visit: https://www.lookout.com/products/platform

Additional Resources:

About Lookout

Lookout is the leader in endpoint-to-cloud security. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, VMware, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit http://www.lookout.com and follow Lookout on its blog, LinkedIn, and Twitter.

Contact Lookout PR: press@lookout.com

About Business Intelligence Group

The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry and business award programs, business executivesthose with experience and knowledgejudge the programs. The organization's proprietary and unique scoring system selectively measures performance across multiple business domains and then rewards those companies whose achievements stand above those of their peers.

View original content to download multimedia:

SOURCE Lookout

The above press release was provided courtesy of PRNewswire. The views, opinions and statements in the press release are not endorsed by Gray Media Group nor do they necessarily state or reflect those of Gray Media Group, Inc.

Here is the original post:

Lookout Named a Global Leader for Cloud Security Service in the 2021 Stratus Cloud Computing Awards - WDBJ7

Posted in Cloud Computing | Comments Off on Lookout Named a Global Leader for Cloud Security Service in the 2021 Stratus Cloud Computing Awards – WDBJ7

Cloud computing security – Wikipedia

Posted: October 17, 2021 at 5:25 pm

Broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Cloud computing and storage provide users with capabilities to store and process their data in third-party data centers.[1] Organizations use the cloud in a variety of different service models (with acronyms such as SaaS, PaaS, and IaaS) and deployment models (private, public, hybrid, and community).[2]

Security concerns associated with cloud computing are typically categorized in two ways: as security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud).[3] The responsibility is shared, however, and is often detailed in a cloud provider's "shared security responsibility model" or "shared responsibility model."[4][5][6] The provider must ensure that their infrastructure is secure and that their clients data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.[5][6]

When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a 2010 Cloud Security Alliance report, insider attacks are one of the top seven biggest threats in cloud computing.[7] Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers are recommended to be frequently monitored for suspicious activity.

In order to conserve resources, cut costs, and maintain efficiency, cloud service providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.[2]

The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service.[8] Virtualization alters the relationship between the OS and underlying hardware be it computing, storage or even networking. This introduces an additional layer virtualization that itself must be properly configured, managed and secured.[9] Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist.[10] For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.

Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management.[11] The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:[11]

It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, typically by assessing the threats, vulnerabilities and impacts. Cloud security concerns can be grouped in various ways; Gartner named seven[12] while the Cloud Security Alliance identified twelve areas of concern.[13] Cloud access security brokers (CASBs) are software that sits between cloud users and cloud applications to provide visibility into cloud application usage, data protection and governance to monitor all activity and enforce security policies.[14]

Scanning the cloud from outside and inside using free or commercial products is crucial because without a hardened environment your service is considered a soft target. Virtual servers should be hardened just like a physical server against data leakage, malware, and exploited vulnerabilities. "Data loss or leakage represents 24.6% and cloud related malware 3.4% of threats causing cloud outages[16]

Scanning and penetration testing from inside or outside the cloud must be authorized by the cloud provider. Since the cloud is a shared environment with other customers or tenants, following penetration testing rules of engagement step-by-step is a mandatory requirement. Violation of acceptable use policies can lead to termination of the service.[17]

There are numerous security threats associated with cloud data services. This includes traditional threats and non-traditional threats. Traditional threats include: network eavesdropping, illegal invasion, and denial of service attacks, but also specific cloud computing threats, such as side channel attacks, virtualization vulnerabilities, and abuse of cloud services. The following security requirements limit the threats.[18]

Data confidentiality is the property that data contents are not made available or disclosed to illegal users. Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others, including CSPs, should not gain any information of the data. Meanwhile, data owners expect to fully utilize cloud data services, e.g., data search, data computation, and data sharing, without the leakage of the data contents to CSPs or other adversaries.

Access controllability means that a data owner can perform the selective restriction of access to their data outsourced to the cloud. Legal users can be authorized by the owner to access the data, while others can not access it without permissions. Further, it is desirable to enforce fine-grained access control to the outsourced data, i.e., different users should be granted different access privileges with regard to different data pieces. The access authorization must be controlled only by the owner in untrusted cloud environments.

Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that her or his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. Further, when a portion of the outsourced data is corrupted or lost, it can still be retrieved by the data users.

Some advanced encryption algorithms which have been applied into cloud computing increase the protection of privacy. In a practice called crypto-shredding, the keys can simply be deleted when there is no more use of the data.

Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext.

In the CP-ABE, the encryptor controls access strategy. The main research work of CP-ABE is focused on the design of the access structure.[19]

In the KP-ABE, attribute sets are used to describe the encrypted texts and the private keys are associated to specified policy that users will have.[20][21][22]

Fully homomorphic encryption allows computations on encrypted data, and also allows computing sum and product for the encrypted data without decryption.[23]

Searchable encryption is a cryptographic system which offer secure search functions over encrypted data.[24][25] SE schemes can be classified into two categories: SE based on secret-key (or symmetric-key) cryptography,and SE based on public-key cryptography. In order to improve search efficiency, symmetric-key SE generally builds keyword indexes to answer user queries. This has the obvious disadvantage of providing multimodal access routes for unauthorized data retrieval, bypassing the encryption algorithm by subjecting the framework to alternative parameters within the shared cloud environment.[26]

Numerous laws and regulations pertain to the storage and use of data. In the US these include privacy or data protection laws, Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act, the Federal Information Security Management Act of 2002 (FISMA), and Children's Online Privacy Protection Act of 1998, among others. Similar standards exist in other jurisdictions, eg Singapore's Multi-Tier Cloud Security Standard.

Similar laws may apply in different legal jurisdictions and may differ quite markedly from those enforced in the US. Cloud service users may often need to be aware of the legal and regulatory differences between the jurisdictions. For example, data stored by a cloud service provider may be located in, say, Singapore and mirrored in the US.[27]

Many of these regulations mandate particular controls (such as strong access controls and audit trails) and require regular reporting. Cloud customers must ensure that their cloud providers adequately fulfill such requirements as appropriate, enabling them to comply with their obligations since, to a large extent, they remain accountable.

Aside from the security and compliance issues enumerated above, cloud providers and their customers will negotiate terms around liability (stipulating how incidents involving data loss or compromise will be resolved, for example), intellectual property, and end-of-service (when data and applications are ultimately returned to the customer). In addition, there are considerations for acquiring data from the cloud that may be involved in litigation.[30] These issues are discussed in service-level agreements (SLA).

Legal issues may also include records-keeping requirements in the public sector, where many agencies are required by law to retain and make available electronic records in a specific fashion. This may be determined by legislation, or law may require agencies to conform to the rules and practices set by a records-keeping agency. Public agencies using cloud computing and storage must take these concerns into account.

See the original post:

Cloud computing security - Wikipedia

Posted in Cloud Computing | Comments Off on Cloud computing security – Wikipedia

What is Cloud Computing? – Computer Hope

Posted: at 5:25 pm

Updated: 07/06/2021 by Computer Hope

Cloud computing is a term used to describe services provided over a network by a collection of remote servers. This abstract "cloud" of computers provides massive, distributed storage and processing power that can be accessed by any Internet-connected device running a web browser. Schools, businesses, and everyone can benefit from cloud computing due to its ease of uploading and downloading information, making it simple to share information locally and globally.

Cloud computing is accessed through an application (e.g., Dropbox app) on your computer, smartphone, tablet, or other mobile device. It is also often possible to access cloud computing through a website using your browser. All current browsers including Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, support cloud computing.

If you have spent any time on the Internet or use devices connected to the Internet, you likely have used cloud computing in some form. Below are examples of cloud computing you have likely heard of or used and examples for online storage of pictures, videos, documents, and other files.

AWS, Big data, Cloud gaming, Database terms, Dropbox, Google Cloud Platform, Heroku, Hybrid cloud, iCloud, Internet terms, Network terms, Office 365, OpenStack, P2P, PaaS, Personal cloud, Project Atlas, SaaS, SkyDrive, Stadia, Storage device, Supercomputer, Web 2.0, Web-based application

Visit link:

What is Cloud Computing? - Computer Hope

Posted in Cloud Computing | Comments Off on What is Cloud Computing? – Computer Hope

Page 57«..1020..56575859..7080..»