
How serious are organizations about their data sovereignty strategies?
Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98% of …

Organizations lack visibility into unauthorized public cloud data access
Laminar released findings from its 2022 Security Professional Insight Survey conducted at AWS re:Inforce in July 2022 and Black Hat in August 2022. The research revealed gaps …

What’s challenging development teams amid their race to the cloud?
Couchbase announced findings from industry research examining the challenges faced by development teams amid the race to the cloud and to execute on digital transformation …

Most educational institutions store sensitive data in the cloud. Is it safe?
A Netwrix survey revealed that 47% of educational institutions suffered a cyberattack on their cloud infrastructure within the last 12 months. For 27% of them, incidents in …

Companies struggle to govern their new cloud environments
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

1 in 3 organizations don’t know if their public cloud data was exfiltrated
Laminar released findings from its 2022 Security Professional Insight Survey conducted at AWS re:Inforce in July 2022 and Black Hat in August 2022. The research revealed gaps …

How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their …

Incident response in the cloud can be simple if you are prepared
If your business has moved toward off-premises computing, there’s a bonus to the flexibility and scalability services that AWS and Microsoft 365 can provide. Incident response …

“ParseThru” vulnerability allows unauthorized access to cloud-native applications
A new vulnerability found in GoLang-based applications allows a threat actor to bypass validations under certain conditions and gain unauthorized access to cloud-native …

Cloud computing top concerns: The focus is shifting
The Cloud Security Alliance (CSA) released the Top Threats to Cloud Computing: The Pandemic 11 report, which found a marked change in what cloud security provider (CSP) …

Only 13.5% of IT pros have mastered security in the cloud native space
Canonical released data from a survey revealing the goals, benefits, and challenges of cloud-native technologies. The report has surveyed more than 1,300 IT professionals over …

40% of enterprises don’t include business-critical systems in their cybersecurity monitoring
Logpoint has announced findings from a recent poll to uncover the security and cost implications enterprises face with their existing IT infrastructure. The poll was targeted …