Digital fraudsters are sending out emails and SMS messages that link to tech support scams hosted on popular cloud platforms.
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.
Businesses that want to advance cloud security at scale need to invest in both the people and the technology that will reduce risks.
When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.
A massive brute-force attack campaign used both legacy protocols and credential dumps to compromise cloud user accounts, according to security researchers.
Regardless of what cloud service model you adopt, it's important to consider security implications related to application development, data and contract management, and IT asset governance.
Moving identity management processes to cloud IAM services introduces benefits such as cost-efficiency, flexibility, faster deployments and simplified operations.
We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.
Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.