CLOUD THREAT NEWSLETTER

KW 49 / 2022

Datum

AWS is changing

05/12/2022

Announcements at re:Invent show a kinder, gentler Amazon, ready to integrate its own services and third-party data sources.

Published by: infoworld.com
Writer: Matt Asay

Anwendungsmodernisierung statt Hardware-Redundanz

05/12/2022

Redundant ausgelegte IT-Systeme garantieren bei kritischen Vorfällen in der Regel die Geschäftskontinuität. Die wenigsten Unternehmen nutzen jedoch die Möglichkeiten, die sich durch eine Anwendungsmodernisierung ergeben. Doppelt vorgehaltene Komponenten kommen nicht nur teuer, sie verschlechtern auch die CO2-Bilanz.

Published by: cloudcomputing-insider.de
Writer: Peter Dümig

AWS re:Invent 2022 roundup: Data management, AI, compute take center stage

02/12/2022

This week at its re:Invent conference, AWS launched new services and features across its storage, compute, analytics, machine learning, database, and security services, and made a foray into supply chain management.

Published by: infoworld.com
Writer: Anirban Ghoshal

„Business-Owned“ Use-Cases statt IT im Alleingang

02/12/2022

Der Nutzen einer Enterprise Ressource Planning-Lösung liegt auf der Hand: Daten für alle Entscheider sichtbar und vor allem nutzbar machen. Doch schon bei der Einführung von ERP-Systemen scheitern 40 Prozent der Unternehmen.

Published by: cloudcomputing-insider.de
Writer: Björn Stauss

Where Advanced Cyberttackers Are Heading Next: Disruptive Hits, New Tech

02/12/2022

Following a year of increasingly disruptive attacks, advanced persistent threat groups will likely only become emboldened in 2023, security experts say.

Published by: darkreading.com
Writer: Robert Lemos

Cloud computing gets back to basics

02/12/2022

Recent trends show a return to cloud fundamentals, such as data, development, deployment, and security, rather than chasing what’s new and cool.

Published by: infoworld.com
Writer: David Linthicum

Oliver Paterson, VIPRE: On email security in the era of hybrid working

01/12/2022

With remote working the future for so many global workforces – or at least some kind of hybrid arrangement – is there an impact on email security we are all missing? Oliver Paterson, director of product management at VIPRE Security, believes so.

Published by: cloudcomputing-news.net
Writer: James Bourne

IT Awards 2022: Die beliebtesten Anbieter von Enterprise Software-as-a-Service 2022

01/12/2022

Der Schritt in die Cloud ist auch im Bereich der Unternehmenssoftware zum Alltag geworden. Während Enterprise-Lösungen traditionell eher On-Premises betrieben wurden, ist der Einsatz von Enterprise Software-as-a-Service (SaaS) mittlerweile absolut gängig. Das Konzept ermöglicht unter anderem hohe Flexibilität und planbare Kosten.

Published by: cloudcomputing-insider.de
Writer: Martin Hensel

IBM Cloud Supply Chain Vulnerability Showcases New Threat Class

01/12/2022

The Hell’s Keychain attack vector highlights common cloud misconfigurations and secrets exposure that can pose grave risk to enterprise customers.

Published by: darkreading.com
Writer: Elizabeth Montalbano

AWS Lambda kickstarts Java functions

30/11/2022

AWS Lambda SnapStart cuts Java startup times by initializing Java functions ahead of time and caching a snapshot of the initialized execution environment.

Published by: infoworld.com
Writer: Paul Krill

James Todd, KPMG: On automation and machine learning as the future of security

29/11/2022

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

Published by: cloudcomputing-news.net
Writer: James Bourne

Oracle Fusion Middleware Flaw Flagged by CISA

29/11/2022

The bug could allow unauthorized access and takeover, earning it a spot on the Known Exploited Vulnerabilities Catalog.

Published by: darkreading.com
Writer: Dark Reading Staff

AWS SimSpace Weaver tackles large-scale spatial simulations

29/11/2022

The new managed compute service allows enterprises to run complex, 3D simulations with more than a million objects, AWS said at re:Invent.

Published by: infoworld.com
Writer: Anirban Ghoshal

Bring Your Own Key — A Placebo?

28/11/2022

BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.

Published by: darkreading.com
Writer: Erez Kalman

Weitere
artikel