Facebook iconTwitter icon
B2B-Network:
Studie
Gemalto Global Cloud Data Security Study: The Cloud As A Risk?!
Thumb cloudx

Many european countries have always focused on protecting the assets stored in their corporate clouds. One of these is UK and Germany. However, the United Kingdom now seems to fall behind. This is according to the recent study that Gemalto, a digital security company, has conducted. 

 

Data Privacy and Protection

The need to regulate data in the cloud has continually been dire since customer information and payment information among other vital information are always at stake, because of their high level of sensitivity. Hence, many companies have...

» Read more
Studie
Modern App Report: Popularity of Container Use in the Cloud Continues to Rise
Thumb container

According to the recent State of Modern Applications in the Cloud Report, the popularity of container cloud systems is on the rise. It was collected from more than 1500 customers who were using various digital platforms such as Google Cloud, Azure, and AWS. To manage product applications, as well as the underlying infrastructures, the customers were relying on Sumo Logic. Apart from that, the report indicates, that when it comes to the AWS, the leading operating system is Linux, which is growing at a faster rate when compared to Azure. In 2014, Linux was at 4 per cent, while in the...

» Read more
Comment
The three main benefits of edge analytics 
Thumb analyse

Edge analytics is a rapidly evolving approach to cyber security and data collection that is being put to use across a range of industries. Instead of data being sent back to a centralised data store, edge analytics involves an automatic analytical computation via a network switch, sensor or another type of device, which is situated close to the devices generating the data. 

The advantages of this shift are threefold:

 

1. A more effective way of detecting and acting upon threats to cyber security

Edge analytics works by allowing IT to have a faster understanding of the real-time...

» Read more
Analysis
Cloud Vendors and Users Need To Collaborate
Thumb cloud5

Security is a very important issue when working on projects using the cloud. Often, business leaders will view the cloud provider as the responsibility holder in terms of security, it does, however, require a more collaborative approach. Business leaders and the cloud providers should work together when it comes to security issues, and work to provide a safe and secure solution. Cloud computing is a good option for businesses looking to save money, and provides streamline solutions to issues like data processing, and storage needs. 

 

About Cloud Security 

It is a lot easier...

» Read more
Analysis
Securing IoT Device in Enterprises
Thumb internetofthings

IoT stands for 'internet of things' and refers to any device where you have a lack of control over the software run on it. These can include security devices, house control gadgets and countless other pieces of tech that have been increasingly popular lately. However, despite how useful these gadgets are, it is frustrating to know whether they are secure and ensure they are running securely. Since these devices are often security related they could easily give open access to private information which is extremely worrying.
 

How can I secure my IoT Device?

There are a few...

» Read more
Study
The Revolution of IoT
Thumb arbeiten

Internet of things (IoT) is expected to take a significant turn in its growth in the next 3 years. Following IoT Developer Survey 2015-2016 many executives are aware of this looming revolution and a few of them have made strategies on how to keep their businesses relevant. Some of the key IoT developer trends that were found in 2017's survey are:

 

1. Security

Security remains to be the key concern with 46.7% respondents admitting that it remains a major disquiet. Business security has been compromised on various occasions with the ever rising cases of malware attack....

» Read more
Loader