Closing the cloud skills gap as adoption grows

Closing the cloud skills gap as adoption grows

Global spending on public clouds has increased by 20.4% in the last year alone. Despite this rapid adoption rate and spike in spending, one out of every four IT and security specialists have struggled to keep up with the expertise and training required to adequately implement cloud security. As cloud use continues to grow, training and scaling teams to protect a modern cloud environment will pay off exponentially in the form of better data security…

Read More

83% of organizations faced at least one account takeover the past year

83% of organizations faced at least one account takeover the past year

A survey from Abnormal Security reveals that account takeovers are a prominent threat. By surveying 300 security professionals across a range of industries and organization sizes, the report found that 83% of organizations claimed to have experienced at least one account takeover in the last year. Furthermore, 45.5% of organizations experienced more than five account takeover incidents in the past year, and nearly one in five experienced more than 10. The survey determined that 77%…

Read More

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

Top 5 Cloud Trends U.K. Businesses Should Watch in 2024

As business data demands increase, cloud providers and their customers find themselves having to consider the implications of increasing storage costs, security risks and environmental footprint. Such impacts are of particular importance to U.K. organisations, as it is the largest cloud market in Europe. TechRepublic spoke to U.K. cloud experts to identify the top five industry trends emerging from the country’s burgeoning reliance on the fundamental IT infrastructure. These cloud trends are: Premiumisation of cloud packages….

Read More

Security leaders are facing a new wave of identity risks

Security leaders are facing a new wave of identity risks

A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. The study, done by ConductorOne, surveyed more than 500 IT security leaders in the United States and found that increased complexity is driving new identity risks.  On the subject of technology complexity, the report found that hybrid IT environments are common. 76% of respondents reported that their company has a hybrid IT environment. 18%…

Read More

Top 5 Global Cyber Security Trends of 2023, According to Google Report

Top 5 Global Cyber Security Trends of 2023, According to Google Report

It is taking less time for organisations to detect attackers in their environment, a report by Mandiant Consulting, a part of Google Cloud, has found. This suggests that companies are strengthening their security posture. The M-Trends 2024 report also highlighted that the top targeted industries of 2023 were financial services, business and professional services, tech, retail and hospitality, healthcare and government. This aligns with the fact that 52% of attackers were primarily motivated by financial…

Read More

Quantum Cloud Computing Secured in New Breakthrough at Oxford

Quantum Cloud Computing Secured in New Breakthrough at Oxford

Businesses are one step closer to quantum cloud computing, thanks to a breakthrough made in its security and privacy by scientists at Oxford University. The researchers used an approach dubbed ‘blind quantum computing’ to connect two quantum computing entities (Figure A); this simulates the situation where an employee at home or in an office remotely connects to a quantum server via the cloud. With this method, the quantum server provider does not need to know…

Read More

Elevate Your Career with the New Cisco Service Provider Cloud Networking Certification

Elevate Your Career with the New Cisco Service Provider Cloud Networking Certification

Calling all service provider network engineers and networking professionals! We have just unveiled the new Cisco Service Provider Cloud Network Infrastructure Specialist Certification, specifically crafted for those overseeing the intricacies of day-to-day cloud infrastructure. This new Cisco certification proves that you have the skills to implement today’s most complex cloud networks. But what makes it stand out? And why should it be on your radar? Let’s delve into the details. Unlocking the world of cloud networking…

Read More

Data Power: What the EU Data Act Means for You

Data Power: What the EU Data Act Means for You

On 27 November the European Council adopted the EU Data Act, a first-of-its-kind law that aims to unlock the value of ‘industrial data’ in the European Union (EU). It will enter into force early 2024, starting the 20-month clock for companies to comply with its requirements. This is the culmination of almost four years of work stretching back to the European Data Strategy. Cisco has been engaging throughout the legislative process and welcomes the opportunity…

Read More

Cloud Connectivity: Learn How to Connect the Cloud (The Right Way)

Cloud Connectivity: Learn How to Connect the Cloud (The Right Way)

A few years ago, you could be forgiven for not worrying about cloud computing and cloud providers, especially at the enterprise level. In fact, in your daily life, you might have only known “the cloud” as something that allowed you to binge-watch your favorite streaming series or enabled speedy response times on your mobile apps, whether you’re in Los Angeles, London, Lima, or Lagos. Nowadays–whether you know it or not–your enterprise is probably in the…

Read More

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub repositories and starts using them less than five minutes later. The final payload runs customized Monero cryptomining software…

Read More
1 2 3 4 19