Tag: cloud
-
Business continuity and cybersecurity: Two sides of the same coin
Tags: access, ai, attack, backup, breach, business, cloud, control, corporate, credentials, cyber, cybercrime, cybersecurity, data, data-breach, detection, email, finance, framework, google, incident response, infrastructure, intelligence, Internet, network, nist, ransomware, RedTeam, resilience, risk, sans, service, strategy, tactics, threat, tool, training, veeam, vulnerability, zero-trustWhy traditional business continuity plans fail against modern threats: I’ve implemented change management processes in environments requiring 99.99% uptime and I can tell you that most business continuity plans were designed for a different era. They assume that your backup systems, communication channels and recovery procedures will be available when you need them. Today’s threat…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Microsoft’s data sovereignty: Now with extra sovereignty!
Under shadow of US CLOUD Act, Redmond releases raft of services to calm customers in the EU First seen on theregister.com Jump to article: www.theregister.com/2025/11/07/microsoft_announces_strengthening_of_sovereignty/
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
Microsoft’s data sovereignty: Now with extra sovereignty!
Under shadow of US CLOUD Act, Redmond releases raft of services to calm customers in the EU First seen on theregister.com Jump to article: www.theregister.com/2025/11/07/microsoft_announces_strengthening_of_sovereignty/
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
Microsoft’s data sovereignty: Now with extra sovereignty!
Under shadow of US CLOUD Act, Redmond releases raft of services to calm customers in the EU First seen on theregister.com Jump to article: www.theregister.com/2025/11/07/microsoft_announces_strengthening_of_sovereignty/
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Why can’t enterprises get a handle on the cloud misconfiguration problem?
Tags: access, ai, authentication, awareness, breach, business, cloud, communications, computing, control, cybersecurity, data, data-breach, encryption, governance, hacker, infrastructure, least-privilege, mfa, monitoring, network, risk, saas, service, technology, tool, training, usa, zero-trustStop. Reassess. Reconfigure: Last year, according to Ayan Roy, EY Americas cybersecurity competency leader, the highest number of breaches were caused by shared cloud repositories. “That’s where we saw the maximum amount of data exfiltration,” he says. “A lot was from shared cloud stores and SaaS applications.” That’s despite the fact that the clients have…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
The Shift Toward Zero-Trust Architecture in Cloud Environments
As businesses grapple with the security challenges of protecting their data in the cloud, several security strategies have emerged to safeguard digital assets and ensure compliance. One such security strategy is called zero-trust security. Zero-trust architecture fosters the ‘never trust, always verify’ principle and emphasizes the need to authenticate users without trust. Contrary to traditional security approaches that leverage perimeter-based security, zero-trust architecture assumes that threats exist outside as well..…
-
Eperi kündigt <> für die ServicenowPlattform an, um die sichere Automatisierung von Geschäftsprozessen zu verbessern
Eperi gab ihren neuen Status als Servicenow-Build-Partner bekannt. Die Partnerschaft unterstreicht die Bedeutung von Datenhoheit und Compliance in Cloud-Diensten, um Unternehmen, die auf Servicenow setzen, noch besser zu unterstützen. Als Servicenow-Build-Partner bietet Eperi eine plattformunabhängige Verschlüsselungslösung, die Daten schützt, bevor sie die Kundenumgebung verlassen, und sicherstellt, dass sie innerhalb von Servicenow jederzeit verschlüsselt bleiben. Die…
-
The Shift Toward Zero-Trust Architecture in Cloud Environments
As businesses grapple with the security challenges of protecting their data in the cloud, several security strategies have emerged to safeguard digital assets and ensure compliance. One such security strategy is called zero-trust security. Zero-trust architecture fosters the ‘never trust, always verify’ principle and emphasizes the need to authenticate users without trust. Contrary to traditional security approaches that leverage perimeter-based security, zero-trust architecture assumes that threats exist outside as well..…
-
Eperi kündigt <> für die ServicenowPlattform an, um die sichere Automatisierung von Geschäftsprozessen zu verbessern
Eperi gab ihren neuen Status als Servicenow-Build-Partner bekannt. Die Partnerschaft unterstreicht die Bedeutung von Datenhoheit und Compliance in Cloud-Diensten, um Unternehmen, die auf Servicenow setzen, noch besser zu unterstützen. Als Servicenow-Build-Partner bietet Eperi eine plattformunabhängige Verschlüsselungslösung, die Daten schützt, bevor sie die Kundenumgebung verlassen, und sicherstellt, dass sie innerhalb von Servicenow jederzeit verschlüsselt bleiben. Die…
-
The Shift Toward Zero-Trust Architecture in Cloud Environments
As businesses grapple with the security challenges of protecting their data in the cloud, several security strategies have emerged to safeguard digital assets and ensure compliance. One such security strategy is called zero-trust security. Zero-trust architecture fosters the ‘never trust, always verify’ principle and emphasizes the need to authenticate users without trust. Contrary to traditional security approaches that leverage perimeter-based security, zero-trust architecture assumes that threats exist outside as well..…
-
Eperi kündigt <> für die ServicenowPlattform an, um die sichere Automatisierung von Geschäftsprozessen zu verbessern
Eperi gab ihren neuen Status als Servicenow-Build-Partner bekannt. Die Partnerschaft unterstreicht die Bedeutung von Datenhoheit und Compliance in Cloud-Diensten, um Unternehmen, die auf Servicenow setzen, noch besser zu unterstützen. Als Servicenow-Build-Partner bietet Eperi eine plattformunabhängige Verschlüsselungslösung, die Daten schützt, bevor sie die Kundenumgebung verlassen, und sicherstellt, dass sie innerhalb von Servicenow jederzeit verschlüsselt bleiben. Die…
-
Enterprise Credentials at Risk Same Old, Same Old?
Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are…
-
Sicherheit moderner Cloud-Dienste – Von Speicher zu Smart: Was Nutzer heute von der Cloud erwarten
Tags: cloudFirst seen on security-insider.de Jump to article: www.security-insider.de/datenspeicherung-in-deutschland-und-eu-a-a63c44a4b310b701e10d68d457fb9d6e/
-
Optimistic About Cloud Security? You Need NHIs
What is the Pivotal Role of Non-Human Identities in Cloud Security? How secure is your organization’s cloud infrastructure? It’s a crucial question while more businesses shift to cloud environments and face complex security challenges. One often-overlooked yet vital component of a comprehensive cybersecurity strategy involves the management of Non-Human Identities (NHIs). These machine identities, comprising……
-
Nikkei Data Breach Exposes Personal Information of 17,000 Individuals
A malware attack on Nikkei’s Slack platform exposed data from over 17,000 people, underscoring human and cloud security risks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/news-nikkei-data-breach/

