Cyber Attackers Targeting the Keys to the Cloud Kingdom

Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers. If your organization relies solely on the cloud vendor for security, you’re exposed to unnecessary risk. Being proactive in cloud security is a requirement to face...

Survey – 73% of citizens would provide biometric data such as fingerprints, retinal scans to government in exchange for more-personalized services

By CloudBuzz / September 20, 2018

Citizen Enthusiasm for Personalized Government Services and Digital Innovation Are on the Rise, Accenture Survey Finds  Greater comfort with artificial intelligence a factor in increased expectations for government innovation ARLINGTON, Va.; Sept. 20, 2018 – Enthusiasm for artificial intelligence (AI) is

Cyber Threat Alliance Releases Cryptomining Whitepaper

By CloudBuzz / September 19, 2018

Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see it as a quick way to steal other users’ processing

Financial Services Firms Improve Their Cyber Resilience and Prevent More Than 80 Percent of Cyber Breaches, Accenture Study Finds

By CloudBuzz / September 17, 2018

Yet risks associated with emerging technologies, including machine learning and artificial intelligence, are prevalent and challenge existing security defenses NEW YORK; Sept. 17, 2018 – Despite the volume of cyberattacks doubling in 2017, financial services firms are closing the gap

GDPR Requires IRM For Fast and Effective Response

By CloudBuzz / September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection Regulation (GDPR). The discussion was fueled by the recent cyber attack

Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

By Marty Puranik / September 10, 2018

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare and Medicaid Services (CMS). The #1 reason for failure is the absence of a full-spectrum healthcare risk assessment. These assessments

blockchain

BA apologizes after 380,000 customers hit in cyber attack

By CloudBuzz / September 7, 2018

LONDON (Reuters) – British Airways was forced to apologize on Friday after the credit card details of hundreds of thousands of its customers were stolen over a two-week period in the most serious attack on its website and app. The

Why Manufacturing is an Attractive Industry for Cyberattacks

By CloudBuzz / September 6, 2018

An estimated 48 percent of UK manufacturers have suffered a cyberattack at some point with half of them incurring financial losses or disruption to their business. Secureworks® research shows that manufacturing is one of the three most targeted industries when it comes

The Surprising Security Benefits of Moving Collaboration to the Cloud

By Melissa Pallotti / September 6, 2018

Cloud Security Collaboration How Backups, Remote Wipes, and Other Features Keep Your Data Safe By now, you’re probably aware that cloud computing powers a lot of the tools and applications you use every day. But cloud computing isn’t just the

Remote Patient Monitoring – One of the Most Important Applications of IoT in Healthcare

By CloudTweaks / September 5, 2018

Remote Patient Monitoring The application of IoT in Healthcare services is bringing the paradigm shift in terms of how this industry operates, the accuracy of diagnosis and quality of treatment. It is changing the model from ‘hospital-centric’ to ‘home-centric’, making

DATA SOVEREIGNTY

Data Sovereignty: the ONLY truly safe path to avoid Privacy Shield turmoil

By Bill Mew / August 30, 2018

DATA SOVEREIGNTY India is following Russia and others in imposing data sovereignty restrictions that specify that data must remain in country. Meanwhile the European Parliament has called for the suspension of Privacy Shield from 1st September. How should ethical, customer-centric

Thought Leaders

State of the Cloud Report

State of the Cloud Report

Cloud Report As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the Cloud ...
The Connected Car: The Unknown Hero of Automotive Innovation

The Connected Car: The Unknown Hero of Automotive Innovation

Connected Car Innovation Spanning the last decade, the automotive industry has seen an explosion of technological innovation which has, and ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies ...
The Economics, Concepts and Fundamentals of Cloud Computing

The Economics, Concepts and Fundamentals of Cloud Computing

Fundamentals of Cloud Computing Addressing security concerns of the Public Cloud Enthusiasm for cloud computing has as much to do ...
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a ...