CLOUD THREAT NEWSLETTER

KW 01 / 2023

Datum

Wie Führungskräfte die Vorteile der Hybrid Cloud 2023 nutzen sollten

02/01/2023

Im Jahr 2022 wurde deutlich, dass die Hybrid Cloud der dominierende Ansatz ist. Eine aktuelle Studie von IBM untermauert das: 79 Prozent der Befragten in Deutschland gaben an, einen Hybrid-Cloud-Ansatz zu verwenden. Mit Blick auf das Jahr 2023 konzentrieren sich führende Unternehmen nun darauf, das volle Potenzial der Hybrid Cloud auszuschöpfen.

Published by: cloudcomputing-insider.de
Writer: Bernd Schierholz

New Year’s resolutions for cloud pros

30/12/2022

Look forward to a new year and new ways to beef up your cloud computing skills. Here are some ways to prepare for whatever the future may bring.

Published by: infoworld.com
Writer: David Linthicum

Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023

30/12/2022

Dark Reading’s panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.

Published by: darkreading.com
Writer: Tara Seals

Wert der IT-Sicherheit: Fünf Faktoren für eine Kosten-Nutzen-Analyse

29/12/2022

IT-Sicherheit hat ein Problem: Sie erzielt keine messbaren Gewinne. In den Augen vieler Unternehmen verursacht sie immer noch zu hohe Kosten. Der Nutzen der Cyberabwehr durch eine umfassende IT-Sicherheitsplattform lässt sich aber durchaus darstellen.

Published by: cloudcomputing-insider.de
Writer: Jörg von der Heydt

When will cloud computing stop growing?

27/12/2022

The pandemic caused a huge cloud computing growth spurt, and cloud is now the foundation for all emerging technology. Growth will continue, but the rate is debatable.

Published by: infoworld.com
Writer: David Linthicum

The fundamentals of Kubernetes cost management

26/12/2022

Kubernetes cost management is about more than numbers. Culture and collaboration help bring together the expertise for you to achieve Kubernetes cost savings.

Published by: infoworld.com
Writer: Will Kelly

3 cloud architecture best practices for industry clouds

23/12/2022

As enterprises seek industry clouds to boost their overall cloud ROI, they should architect with integration and security in mind and not limit their choices to one provider.

Published by: infoworld.com
Writer: David Linthicum

LastPass Cops to Massive Breach Including Customer Vault Data

23/12/2022

LastPass has issued a statement acknowledging that a recent cyberattack has resulted in the theft of customer data, in addition to offering cybercrooks access to encrypted customer vaults.

Published by: darkreading.com
Writer: Dark Reading Staff

Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes

23/12/2022

A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.

Published by: darkreading.com
Writer: Tara Seals

7 kostenlose Tools für die Absicherung der Softwarelieferkette

22/12/2022

Cyberangriffe auf die Software-Supply-Chain können für Unternehmen weitreichende Konsequenzen nach sich ziehen. Aus diesem Grund sollten die Verantwortlichen dafür sorgen, dass die Lieferkette so sicher wie möglich ist. Dabei helfen Zusatztools, mit denen die Sicherheit deutlich erhöht werden kann.

Published by: cloudcomputing-insider.de
Writer: Thomas Joos

New Brand of Security Threats Surface in the Cloud

22/12/2022

Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.

Published by: darkreading.com
Writer: Dark Reading Staff

Externe Schlüsselverwaltung verhilft zu digitaler Souveränität

22/12/2022

T-Systems bietet Kunden der AWS-Cloud ab sofort ein externes Schlüsselmanagement an. Mit dem neuen Service autorisiert und verwaltet T-Systems im Namen seiner Kunden den Zugang zu den Daten. Die Telekom-Tochter will die Schlüssel in ihren Rechenzentren innerhalb der EU, also außerhalb der AWS-Infrastruktur, erstellen und speichern.

Published by: cloudcomputing-insider.de
Writer: Michael Matzer

Google WordPress Plug-in Bug Allows AWS Metadata Theft

22/12/2022

A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.

Published by: darkreading.com
Writer: Nathan Eddy

When containers are not the answer

20/12/2022

Containers are being sold as a cure-all for cloud computing systems, but they have a specific purpose, and in many instances should not be used.

Published by: infoworld.com
Writer: David Linthicum

AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range

20/12/2022

Threat actors can take over victims‘ cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.

Published by: darkreading.com
Writer: Elizabeth Montalbano

When to architect for the edge

20/12/2022

When time is money or safety, or you face data compliance regulations, edge computing may be your best bet. Here are 5 scenarios where edge makes sense.

Published by: infoworld.com
Writer: Isaac Sacolick

The best way to pursue cloud sustainability

20/12/2022

Making your cloud deployment cost-efficient kills two birds with one stone: It saves money and helps your sustainability goals.

Published by: infoworld.com
Writer: David Linthicum

Weitere
artikel