Google Cloud Spanner achieves horizontal scalability, strong consistency, and five nines availability as a service, at a price
Quelle: Review: Google Cloud Spanner takes SQL to NoSQL scale
Whether you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads.
Quelle: Top cloud security controls you should be using
No major cloud provider has fallen victim to all the malware attacks of the last few years. What does that tell you?
Quelle: The latest cyber attacks show why the cloud is safer
Data in the cloud is considered secure, but that doesn’t mean you’re safe from these five threats.
Quelle: Top 5 Cloud Security Threats You Need To Understand – TDWI Upside
Security experts in the U.S and Europe are debating whether the Petya cyber-attack that mainly affected computers in Ukraine, was nation-state inspired and originated in the Russian Federation.
Quelle: Cyber-Security Experts View Petya Malware as Nation-State Attack
As companies optimize their supply chains using interconnected technology, the cyberrisk of disruption and lost business multiplies.
Quelle: Company cyberinsurance — the supply chain dilemma
iQ.Suite Watchdog Sandbox ➤ Effizienter Abwehr ✓ hochentwickelter Malware und ✓ Zero-Day Bedrohungen dank dynamischer Verhaltensanalyse
Quelle: Cloudbasierte Sandbox-Technologie
Autofahrer müssen auf den toten Winkel achten. Doch auch bei der Cloud-Nutzung gibt es unsichtbare Bereiche. So sollten Unternehmen vier Gefahren kennen, die oft im Verborgenen liegen.
Quelle: Achtung: Tote Winkel in der Cloud!
Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers.
Quelle: Check Point boosts cloud-security education to help IT security pros stay relevant
The transition from on-premises to cloud-based email is an opportunity to tighten security controls.
Quelle: Email, email, in the cloud