Cloud security uncertainty: Do you know where your data is?

How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried. In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say […]

The post Cloud security uncertainty: Do you know where your data is? appeared first on Security Intelligence.

Continue reading Cloud security uncertainty: Do you know where your data is?

Organizations under pressure to modernize their IT infrastructures

The use of hybrid multicloud models is forecasted to double over the next one to three years as IT decision makers are facing new pressures to modernize IT infrastructures because of drivers like AI, security, and sustainability, according to Nutanix. … Continue reading Organizations under pressure to modernize their IT infrastructures

Is Edge Computing Living Up to Its Promise in the Australian Market?

Edge computing adoption in Australia has been slowed by challenges including cost and tech stack complexity, but IBM’s Utpal Mangla said global use cases are growing amidst the rollout of 5G. Continue reading Is Edge Computing Living Up to Its Promise in the Australian Market?

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)

VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to mount authentication relay and session hijack attacks. The vulnerabilities haven… Continue reading VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)

Enhancing mainframe security with proven best practices

Mainframe systems have served as the bedrock of enterprise networks for years, standing unmatched in terms of reliability, scalability, and data protection. However, security risks have become a pressing concern as the digital landscape evolves, emergi… Continue reading Enhancing mainframe security with proven best practices

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. Continue reading Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

What is data security posture management?

Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across […]

The post What is data security posture management? appeared first on Security Intelligence.

Continue reading What is data security posture management?

What is data security posture management?

Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across […]

The post What is data security posture management? appeared first on Security Intelligence.

Continue reading What is data security posture management?

Taking the complexity out of identity solutions for hybrid environments

For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently […]

The post Taking the complexity out of identity solutions for hybrid environments appeared first on Security Intelligence.

Continue reading Taking the complexity out of identity solutions for hybrid environments