Cloud-enabled cyberattacks are ramping up, as indicated in a new Netskope study that found 44% of security threats use cloud services in various stages of the kill chain. Attackers are targeting popular cloud apps and services to exploit the growing trust in commonly used enterprise platforms.[...]
44% of malicious threats are cloud enabled, meaning that cybercriminals see the cloud as an effective method for subverting detection, according to Netskope.89% of enterprise users are in the cloud, actively using at least one cloud app every day. Cloud storage, collaboration, and webmail apps[...]
Many enterprises are finding it increasingly difficult to deliver a consistently high-quality end user experience to a global online audience using a single content delivery network (CDN). CDN providers have different strengths and weaknesses—unsurprisingly, a single provider does not adequately[...]
Oracle’s cloudy partnership with Microsoft, announced in June, was one of the more eyebrow-raising stories of 2019. On the surface, it may have seemed peculiar, but digging down, the duo’s focus on retail customers – particularly with some retailers wishing to steer clear of AWS – made sense.[...]
As we move into a new decade IT professionals will be scratching their heads wondering "what new threat is going to cause me to have to rethink my security architecture or user policy?". As a solutions architect working with a wide range of customers, here's my take on what's coming.
Palo Alto Networks released research showing how vulnerabilities in the development of cloud infrastructure are creating significant security risks.The Unit 42 Cloud Threat Report: Spring 2020 investigates why cloud misconfigurations happen so frequently. It finds that as organizations move to[...]
As we look ahead to this year and beyond, we can expect to see an explosion in numbers—think billions—with respect to 5G networks connecting Internet of Things (IoT) devices. The IoT will be a system of many millions of different types of devices for a multitude of applications. Such devices[...]
Microsoft is the most popular supplier of public cloud services and is continuing to gain on AWS, according to research. What's more, the tech giant's cloud platform, Azure, is expected to dominate the market over the next three years. This is according to a survey of over 100 IT executives from[...]
F5 has announced the acquisition of Shape, a company with products and services in the antifraud and abuse category. According to the companies, F5 will pay approximately $1 billion for the privately held Shape.In a blog post to employees, F5 CEO François Locoh-Donou wrote that Shape is[...]
Containerization is rapidly becoming a standard for managing applications in large production environments. Containerization allows our development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. However, managing containers can be a time-consuming task.[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.