Cybersecurity for a More Sustainable Future

As we celebrate Earth Day 2022, companies around the world, including IBM, are continuing broad investment in efforts to combat climate change and strive to bring new ideas to the world in support of sustainability and to make the world a better place for future generations. While the connection between cybersecurity and the environment is […]

The post Cybersecurity for a More Sustainable Future appeared first on Security Intelligence.

Continue reading Cybersecurity for a More Sustainable Future

How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments

Corporate clients and cloud service providers (CSPs) are both responsible for cloud security. Clients remain accountable for governance and compliance. However, their other duties will vary depending upon the type of cloud deployment. What can cloud-native security controls do for your business? What can’t they do? When should you consider using them?  CSPs have created native […]

The post How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments appeared first on Security Intelligence.

Continue reading How Native Security Controls Fit Into Today’s Hybrid Multicloud Environments

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments. Findings from the report incorporate insights from nearly two million endpo… Continue reading How many steps does it take for attackers to compromise critical assets?

Hybrid cloud solutions are the long-term target for most companies

A Hornetsecurity hybrid cloud adoption survey of 900+ IT professionals primarily based in North America and Europe found that 93% of businesses are adopting a hybrid of cloud and on-premise solutions or migrating fully to the cloud within 5 years. 51% … Continue reading Hybrid cloud solutions are the long-term target for most companies

Ransomware wreaked havoc last year, manufacturing was most targeted

IBM Security released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 further burdening global supply chains, with manufacturing emerging as the m… Continue reading Ransomware wreaked havoc last year, manufacturing was most targeted

Multi-tool/multi-cloud environments reaching the limit of their efficacy

CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud needs that hinder cloud innovation. The report is based on responses from over 50… Continue reading Multi-tool/multi-cloud environments reaching the limit of their efficacy

Semperis Hybrid Identity Protection Conference 2021

The Hybrid Identity Protection (HIP) Conference (HIP) is the premier educational forum for IT pros tasked with managing identity and securing hybrid cloud environments. As the global health pandemic and move to digitalization change the way enterprises work, the HIP Conference helps IT pros to learn and implement technology that mitigates new business risks. The […] Continue reading Semperis Hybrid Identity Protection Conference 2021

Enterprise Management Associates: A Survey on Modern Data Security in a Multicloud World

Securing and protecting enterprise data is at the center of the modern security plan. There are many considerations for organizations that aim to move critical workloads and data stores to the cloud, and understanding how business-critical data will be accessed, stored and secured is a paramount concern. Organizations are also facing significant increases in regulations […]

The post Enterprise Management Associates: A Survey on Modern Data Security in a Multicloud World appeared first on Security Intelligence.

Continue reading Enterprise Management Associates: A Survey on Modern Data Security in a Multicloud World

X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

As cybercriminals remain steadfast in their pursuit of unsuspecting ways to infiltrate today’s businesses, a new report by IBM Security X-Force highlights the top tactics of cybercriminals, the open doors users are leaving for them and the burgeoning marketplace for stolen cloud resources on the dark web. The big takeaway from the data is businesses […]

The post X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments appeared first on Security Intelligence.

Continue reading X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and systematically address modern threats to achieve greater enterprise resiliency. O… Continue reading How enterprises use security operations to modernize their business