Cloud News & Reviews

More Cloud News

1088_UnauthorizedCryptocurrency

Attackers Take New Approach to Installing Cryptominers

|
An attacker group known as Rocke is taking a new approach to installing unauthorized cryptocurrency mining software on cloud servers: They're taking control of systems and uninstalling existing cloud security software.
OracleDCmap2

Oracle Expands Cloud Business With Next-Gen Data Center in Canada

|
NEWS ANALYSIS: The database and web services giant is putting heavy capital investments into expanding its cloud infrastructure network globally, starting in North America with its Toronto data center. This is what it must do to compete head-on with Google, AWS, Dell EMC, IBM and other international...
Cybercrime

How Enterprises Need to Handle Today’s Threat Landscape

|
TREND ANALYSIS: The risks to your organization are constantly changing, the level of threat is growing and you need to make sure your approach to security can keep up. A layered approach is most often the right way to go.
Kubernetes Heptio

How VMware Is Advancing Kubernetes Cloud-Native Technology With Heptio VIDEO

|
VIDEO: Craig McLuckie, co-founder of Heptio, and Paul Fazzone, SVP of Cloud-Native Apps at VMware, discuss the future of Kubernetes.
PO_Protectwise

ProtectWise: Product Overview and Analysis

|
PRODUCT ANALYSIS: The ProtectWise Grid is a cloud-delivered network detection and response (NDR) platform that unifies network detection, full-packet forensics and integrated response in an on-demand platform for any environment—enterprise, cloud or industrial.
eWEEK logo Data Points copy

How to Choose the Right App Delivery Controller

|
eWEEK DATA POINTS: Many of today’s ADC solutions are based on architecture designed 20 years ago and now lack agility, flexibility and customizability. But now companies across industries (and especially in e-commerce, banking, health and technology) require radically different ADC solutions....
eweek.logo.ITScience

IT Science Case Study: Understanding How Customers Use Software

|
eWEEK IT SCIENCE: Revulytics Usage Intelligence data has made it much easier to understand the file types and manipulations customers actually use within Extensis font and image software.
DellEMC.edge.portfolio

How Dell’s OEM Group Is Connecting the Edge, Data Center, Cloud

|
IT BUSINESS ANALYSIS: A strategic initiative that Dell calls the “compute continuum” emphasizes OEM solutions that can be effectively deployed, managed and supported from the edge of the network to on-premises data centers to the cloud, regardless of complexity, environmental or scale challenges.
Sonrai Security

Sonrai Security Emerges From Stealth With Cloud Data Control Service

|
The startup officially launches its platform in an effort to help organizations better secure data across multicloud deployments.
VoiceUI

Six Reasons Why You May Want to Rethink Voice UI Strategy

|
eWEEK DATA POINTS: To better serve new and existing customers, many enterprises are turning to technologies such as voice assistants to improve their customer care capabilities. Voice UI has grown alongside that of digital assistants such as Siri, Google, Cortana and Alexa and has shaped consumer...
Salesforce.commerce.cloud

Salesforce Updates Commerce Cloud With AI-Powered Recommendations

|
NEW IN THE CLOUD: The latest update to the Salesforce Commerce Cloud includes a number of features designed to make it easier for consumers to find products and easier for the companies that sell them to manage everything.
GDPR.2019

Predictions 2019: What's in Store for Enterprise Information Practices

|
TREND ANALYSIS: Major data breaches made headlines, advanced data analytics gained wider adoption, new applications for AI emerged and blockchain continued to disrupt. More of the same--only with increased data stores--is expected in 2019.
CyberArk Play-with-Docker

Researchers Reveal Play With Docker Security Vulnerability

|
Researchers from CyberArk discovered a way to hack the popular Play-with-Docker training site, escaping the confines of the container isolation boundary, revealing misconfigurations that have now been fixed.

Enterprise Tech Videos