Debunking the top myths about cloud-based physical security

Cloud Myths

Over the years, cloud-based physical security technology has been increasing in power and popularity as many businesses have begun to favour the cloud over on-premises systems. According to cloud security company Thales, 90% of companies worldwide use the cloud. The cloud is essential to data management for most businesses and there are many reasons why. 

Cloud-based technology is sweeping the security industry because of its advanced abilities and unparalleled convenience....

Microsoft extends security offering for multi-cloud environments

Cloud Security Umbrella

Microsoft is extending its Defender for Cloud service to cover the Google Cloud Platform in an effort to simplify security for organisations utilising multi-cloud strategies.

The move will see all three of the world’s largest public cloud providers protected under the same Microsoft solution for posture management and threat protection, with AWS and Azure already under its scope.

Support for Google Cloud will come with recommendations for users on how to configure...

Imperial College and UAE institute partner for cloud security research

Data Centre

Imperial College London is partnering with the Technology Innovation Institute (TII) in Abu Dhabi to develop a new operating system (OS) designed with cloud security in mind.

According to Professor Peter Pietzuch of the Imperial College Department of Computing, the devices and OS typically used to host cloud services in data centres today have outdated security features.

“Security has not changed much from traditional operating systems that pre-date the internet and...

Why IT needs smarter cloud security

A padlock.

For IT and security professionals, the job is getting more complex day by day. With widely dispersed teams fast becoming the norm, new technologies emerging and an ever-increasing level of threats, it’s a big job and a lot to keep on top of.

There is no doubt that IT needs smarter security. Security management needs to change to take “hybrid” work models into account as well as the new world of cloud services, BYOD and remote access. Comprehensive security solutions such as...

Breaking through the cloud security skills gap

Cloud Security

With the proliferation of remote workers over the past eighteen months, companies have had to rely on cloud-based applications to ensure they remained in business. The recent Application Security Report from Fortinet and Cybersecurity Insiders found that 48% of respondents had more than 100 unique applications running in their environment, whilst 26% reported using more than 500 unique applications. This rapid proliferation of applications has intensified current challenges that security...

Ransomware mitigation sees focus from AWS, Azure, Google Cloud

Ransomware mitigation strategies have become an increasingly important aspect of major cloud providers’ offering following the pandemic.

In recent weeks, Amazon Web Services (AWS), Microsoft Azure and Google Cloud have all published articles recommending mitigation tactics and best practice in the event of a ransomware attack.

A ransomware attack occurs when company files are encrypted and money is demanded in exchange for the decryption key and the maintained privacy...

Greg Day, Palo Alto Networks: On protecting our way of life in the digital age

Security threats have evolved considerably over the years and Palo Alto Networks knows more than most that “protecting our way of life” also requires a digital approach in the modern world.

Historically, nations would protect their way of life by having the sharpest swords, the biggest guns, the sturdiest tanks, or the fastest planes. Nowadays, it’s as much – if not more – about who has the most secure networks and systems.

CloudTech spoke with Greg Day, VP...

Palo Alto unveils third-gen Cortex XDR solution

Palo Alto Networks has unveiled Cortex XDR 3.0, the next generation of the cybersecurity firm’s extended detection and response (XDR) solution.

The upgrade will provide updated analytic tools to deal with the increasingly sophisticated cybersecurity attacks initiating cloud and identity-based threats.

More specifically, the third generation offers security operations centres even broader protections across their attack surface. By extending detection, monitoring, and...

Cloud account compromises costs organisations £4.5m annually

An open padlock.

The average cost of cloud account compromises reached $6.2 million (£4.5m) over a 12-month period according to more than 600 IT and IT security professionals in the US.

This finding is the most revealing of many from a new report on ‘The Cost of Cloud Compromise and Shadow IT’ released by Proofpoint, a cybersecurity and compliance company, and the Ponemon Institute, an IT security research organisation.

Of the respondents, 68% believe cloud account takeovers present...

Cloud security fears continue: Managed services, messaging, FaaS at ‘perilous’ stage

As adoption of managed infrastructure services increases, new cloud attack areas arrive with them. According to a new report from Accurics, 23% of all security violations identified relate to poorly configured manage service offerings.

The study, Accurics' Cloud Cyber Resilience Report, assessed violations and drifts in real-world environments of Accurics users, as well as open source repositories and registries of infrastructure as code (IaC) components.

On average, the...