Organizations are uncovering a cloud security paradox

The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in order to compete in the digital era, but are bogged down by legacy technologies and inefficient siloed processes and tools that are ill-equipped to handle today’s volume of data.

IDaaS Providers: This Is How Cloud Identity Service Rapidly Responded to IoT and Mobile Demands

Accelerated identity and access management (IAM) is the mantra of many identity-as-a-service (IDaaS) providers, and IBM is no exception. Cloud Identity Service, a market-leading full-stack IDaaS solution, provides speedy deployment, lightning-fast onboarding of software-as-a-service (SaaS) applications, increased time to value and on-demand scalability to IBM’s largest enterprise clients. IBM’s enterprise clients are looking at the…

Catastrophic Cloud Attack Costs Would Rival that of Hurricane Damages

Lloyd’s of London estimates multi-billion-dollar loss figures in worst-case scenarios of a major zero-day exploit or massive cloud outage. WannaCry spread like wildfire in a matter of days reaching 150 countries and creating an anticipated $4 billion in losses, but if attackers were to launch a global, system-wide attack that hit a multitude of cloud-based companies,…

Cloud Security & the Power of Shared Responsibility

When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone. When you’re a toddler, you think the world revolves around you, and your personal constitution has one word in it: “mine!” As you grow and develop some wisdom, you recognize…

North Korea’s DDoS Attacks Analyzed Based on IPs

Arbor Networks has used the IP addresses shared recently by United States authorities to analyze distributed denial-of-service (DDoS) attacks attributed to the North Korean government. The security firm believes the data may not be as useful for organizations as the U.S. hopes. Earlier this month, the United States Computer Emergency Readiness Team (US-CERT) released a…

Climbing the Security Maturity Ladder in Cloud

These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads. Astute CIOs are actively migrating to public cloud to take advantage of scalability, flexibility and inherent security at a lower cost. As Rob Alexander, CIO Capital One, said at the AWS re:Invent 2015 conference in Las Vegas, “We…

Protecting your cloud from ransomware

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a piece of the cloud environment that can be secured against potential threats. Ransomware doesn’t have…

Three cybersecurity threat trends that organizations should address today

The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on more mission critical systems. Yet, organizations attempt to counter their threats with the same limited resources. In fact, many industry veterans need to return to the ranks as practitioners…