The cybersecurity trends organizations will soon be dealing with

In this interview with Help net Security, Brad Jones, VP of Information Security at Seagate Technology, talks about cybersecurity trends organizations will be dealing with soon, particlularly concerning cloud misconfiguration, data classification, software vulnerabilities, and the cybersecurity skills gap. Cybersecurity risks are an ever-evolving issue for all organizations. What are the main ones we are […]

Continue Reading

The impact of inadequate SaaS management

In this Help Net Security video, Uri Haramati, CEO at Torii, talks about how it’s impossible for IT to take full ownership or responsibility for managing cloud apps today. Instead, SaaS management is a team sport—but not all the players know they’re on a team. The post The impact of inadequate SaaS management appeared first […]

Continue Reading

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous significant findings about today’s enterprise threat landscape. One key takeaway is that organizations are paying a hefty $1,197 per employee […]

Continue Reading

The security dilemma of data sprawl

As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed and unmanaged cloud app use. In fact, within businesses worldwide, 1 in 5 employees use personal apps to upload, create, share, or store sensitive information, which […]

Continue Reading

Alternatives to a lift-and-shift cloud migration strategy

For most organizations operating in today’s digital landscape, shifting even their most mission-critical workloads from traditional on-premises or colocation-based data deployments to public cloud platforms is increasingly a matter of how fast they can move and not a matter of if they are ready and willing. Cloud advantages Cloud environments offer greater agility and availability, […]

Continue Reading

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating implicit trust helps prevent cloud-related data breaches and provides a security shield for remote workers […]

Continue Reading

La gestion des applications obsolètes lors de la migration cloud

Les responsables informatiques exécutant la migration de leur infrastructure dans le cloud se heurtent souvent à l’obstacle considérable des applications obsolètes ou vieillissantes : elles résident sur un mainframe ou un serveur et ne s’inscrivent pas dans un modèle budgétaire raisonnable pour la migration. Elles deviennent rapidement une source de dépenses massives au sein du […]

Continue Reading