Cyber Attackers Targeting the Keys to the Cloud Kingdom

Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers. If your organization relies solely on the cloud vendor for security, you’re exposed to unnecessary risk. Being proactive in cloud security is a requirement to face...

Financial Services Firms Improve Their Cyber Resilience and Prevent More Than 80 Percent of Cyber Breaches, Accenture Study Finds

By CloudBuzz / September 17, 2018

Yet risks associated with emerging technologies, including machine learning and artificial intelligence, are prevalent and challenge existing security defenses NEW YORK; Sept. 17, 2018 – Despite the volume of cyberattacks doubling in 2017, financial services firms are closing the gap

GDPR Requires IRM For Fast and Effective Response

By CloudBuzz / September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection Regulation (GDPR). The discussion was fueled by the recent cyber attack

How Private Cloud-as-a-Service Enables a Successful Multi-Cloud Strategy

By CloudBuzz / September 10, 2018

With more than 150,000 customers in 150 countries around the world, Rackspace has a front row seat to the unprecedented and accelerating change facing companies of all sizes, with all the opportunities and threats that change represents. Driven by the

Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

By Marty Puranik / September 10, 2018

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare and Medicaid Services (CMS). The #1 reason for failure is the absence of a full-spectrum healthcare risk assessment. These assessments

blockchain

BA apologizes after 380,000 customers hit in cyber attack

By CloudBuzz / September 7, 2018

LONDON (Reuters) – British Airways was forced to apologize on Friday after the credit card details of hundreds of thousands of its customers were stolen over a two-week period in the most serious attack on its website and app. The

Why Manufacturing is an Attractive Industry for Cyberattacks

By CloudBuzz / September 6, 2018

An estimated 48 percent of UK manufacturers have suffered a cyberattack at some point with half of them incurring financial losses or disruption to their business. Secureworks® research shows that manufacturing is one of the three most targeted industries when it comes

Cloud Security Collaboration

The Surprising Security Benefits of Moving Collaboration to the Cloud

By Melissa Pallotti / September 6, 2018

Cloud Security Collaboration How Backups, Remote Wipes, and Other Features Keep Your Data Safe By now, you’re probably aware that cloud computing powers a lot of the tools and applications you use every day. But cloud computing isn’t just the

Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

By CloudTweaks / September 5, 2018

Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this industry operates, the accuracy of diagnosis and quality of treatment. It is changing the model from ‘hospital-centric’ to ‘home-centric’, making

LogMeIn Named Fastest Growing Company in Boston by Fortune

By CloudBuzz / August 30, 2018

Ranks No. 29 on Fortune’s 100 Fastest-Growing Companies List BOSTON, Aug. 30, 2018 (GLOBE NEWSWIRE) — LogMeIn (Nasdaq:LOGM) announced today it has been named the only company in Boston to Fortune magazine’s 2018 100 Fastest-Growing Companies list. The annual Fortune list recognizes top three-year

DATA SOVEREIGNTY

Data Sovereignty: the ONLY truly safe path to avoid Privacy Shield turmoil

By Bill Mew / August 30, 2018

DATA SOVEREIGNTY India is following Russia and others in imposing data sovereignty restrictions that specify that data must remain in country. Meanwhile the European Parliament has called for the suspension of Privacy Shield from 1st September. How should ethical, customer-centric

Thought Leaders

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large ...
5 Simple Tips to Help Avoid Ransomware

5 Simple Tips to Help Avoid Ransomware

5 Tips to Avoid Ransomware Ransomware is a particularly pernicious form of malware: unsatiated by simply using your system as ...
Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Global Public Cloud Spending To Double By 2020

Global Public Cloud Spending To Double By 2020

The Cloud and Endpoint Modeling The worldwide migration of IT resources to the public cloud continues, at a head-spinning pace ...