Google Cloud Spanner achieves horizontal scalability, strong consistency, and five nines availability as a service, at a price
Quelle: Review: Google Cloud Spanner takes SQL to NoSQL scale
Whether you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads.
Quelle: Top cloud security controls you should be using
No major cloud provider has fallen victim to all the malware attacks of the last few years. What does that tell you?
Quelle: The latest cyber attacks show why the cloud is safer
Data in the cloud is considered secure, but that doesn’t mean you’re safe from these five threats.
Quelle: Top 5 Cloud Security Threats You Need To Understand – TDWI Upside
Security experts in the U.S and Europe are debating whether the Petya cyber-attack that mainly affected computers in Ukraine, was nation-state inspired and originated in the Russian Federation.
Quelle: Cyber-Security Experts View Petya Malware as Nation-State Attack
As companies optimize their supply chains using interconnected technology, the cyberrisk of disruption and lost business multiplies.
Quelle: Company cyberinsurance — the supply chain dilemma
iQ.Suite Watchdog Sandbox ➤ Effizienter Abwehr ✓ hochentwickelter Malware und ✓ Zero-Day Bedrohungen dank dynamischer Verhaltensanalyse
Quelle: Cloudbasierte Sandbox-Technologie