Wie Führungskräfte die Vorteile der Hybrid Cloud 2023 nutzen sollten
02/01/2023
Im Jahr 2022 wurde deutlich, dass die Hybrid Cloud der dominierende Ansatz ist. Eine aktuelle Studie von IBM untermauert das: 79 Prozent der Befragten in Deutschland gaben an, einen Hybrid-Cloud-Ansatz zu verwenden. Mit Blick auf das Jahr 2023 konzentrieren sich führende Unternehmen nun darauf, das volle Potenzial der Hybrid Cloud auszuschöpfen.
Published by: cloudcomputing-insider.de
Writer: Bernd Schierholz
New Year’s resolutions for cloud pros
30/12/2022
Look forward to a new year and new ways to beef up your cloud computing skills. Here are some ways to prepare for whatever the future may bring.
Published by: infoworld.com
Writer: David Linthicum
Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023
30/12/2022
Dark Reading’s panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.
Published by: darkreading.com
Writer: Tara Seals
Wert der IT-Sicherheit: Fünf Faktoren für eine Kosten-Nutzen-Analyse
29/12/2022
IT-Sicherheit hat ein Problem: Sie erzielt keine messbaren Gewinne. In den Augen vieler Unternehmen verursacht sie immer noch zu hohe Kosten. Der Nutzen der Cyberabwehr durch eine umfassende IT-Sicherheitsplattform lässt sich aber durchaus darstellen.
Published by: cloudcomputing-insider.de
Writer: Jörg von der Heydt
When will cloud computing stop growing?
27/12/2022
The pandemic caused a huge cloud computing growth spurt, and cloud is now the foundation for all emerging technology. Growth will continue, but the rate is debatable.
Published by: infoworld.com
Writer: David Linthicum
The fundamentals of Kubernetes cost management
26/12/2022
Kubernetes cost management is about more than numbers. Culture and collaboration help bring together the expertise for you to achieve Kubernetes cost savings.
Published by: infoworld.com
Writer: Will Kelly
3 cloud architecture best practices for industry clouds
23/12/2022
As enterprises seek industry clouds to boost their overall cloud ROI, they should architect with integration and security in mind and not limit their choices to one provider.
Published by: infoworld.com
Writer: David Linthicum
LastPass Cops to Massive Breach Including Customer Vault Data
23/12/2022
LastPass has issued a statement acknowledging that a recent cyberattack has resulted in the theft of customer data, in addition to offering cybercrooks access to encrypted customer vaults.
Published by: darkreading.com
Writer: Dark Reading Staff
Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes
23/12/2022
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.
Published by: darkreading.com
Writer: Tara Seals
7 kostenlose Tools für die Absicherung der Softwarelieferkette
22/12/2022
Cyberangriffe auf die Software-Supply-Chain können für Unternehmen weitreichende Konsequenzen nach sich ziehen. Aus diesem Grund sollten die Verantwortlichen dafür sorgen, dass die Lieferkette so sicher wie möglich ist. Dabei helfen Zusatztools, mit denen die Sicherheit deutlich erhöht werden kann.
Published by: cloudcomputing-insider.de
Writer: Thomas Joos
New Brand of Security Threats Surface in the Cloud
22/12/2022
Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.
Published by: darkreading.com
Writer: Dark Reading Staff
Externe Schlüsselverwaltung verhilft zu digitaler Souveränität
22/12/2022
T-Systems bietet Kunden der AWS-Cloud ab sofort ein externes Schlüsselmanagement an. Mit dem neuen Service autorisiert und verwaltet T-Systems im Namen seiner Kunden den Zugang zu den Daten. Die Telekom-Tochter will die Schlüssel in ihren Rechenzentren innerhalb der EU, also außerhalb der AWS-Infrastruktur, erstellen und speichern.
Published by: cloudcomputing-insider.de
Writer: Michael Matzer
Google WordPress Plug-in Bug Allows AWS Metadata Theft
22/12/2022
A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.
Published by: darkreading.com
Writer: Nathan Eddy
When containers are not the answer
20/12/2022
Containers are being sold as a cure-all for cloud computing systems, but they have a specific purpose, and in many instances should not be used.
Published by: infoworld.com
Writer: David Linthicum
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
20/12/2022
Threat actors can take over victims‘ cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.
Published by: darkreading.com
Writer: Elizabeth Montalbano
When to architect for the edge
20/12/2022
When time is money or safety, or you face data compliance regulations, edge computing may be your best bet. Here are 5 scenarios where edge makes sense.
Published by: infoworld.com
Writer: Isaac Sacolick
The best way to pursue cloud sustainability
20/12/2022
Making your cloud deployment cost-efficient kills two birds with one stone: It saves money and helps your sustainability goals.
Published by: infoworld.com
Writer: David Linthicum