Cloud Computing

Cloud Computing | News, how-tos, features, reviews, and videos

conference / convention / audience / applause / clapping

cloud security expert casb binary cloud computing cloud security by metamorworks getty

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

tt19 028 thumb
video

When should enterprises adopt 5G? | TECH(talk)

5G deployment is a hot topic, especially as many countries race to build next-generation networks. The U.S. has banned Huawei from contributing to its network construction, but will that really set the U.S. back? Amid all of the hype...

storm clouds cloud computing cloud threat security lightning tormado by mdesigner125 getty

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

tt19 024 thumb
video

What do recent public SAP exploits mean for enterprises? | TECH(talk)

Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...

CSO Digital Magazine, Spring 2019

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.

cloud security ts

Multi-cloud security the next billion-dollar frontier

Constant change is the new normal. Success in today’s multi-cloud world requires greater adaptability and dynamic methods to protect digital identities and preserve trust.

cloud connect comput woman carry lights

Bare-metal cloud servers vulnerable to Cloudborne flaw

Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

cloud security

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

interview 2.00 00 17 10.still004
video

Craig McLuckie and Joe Beda, creators of Kubernetes | True Technologist Ep 4

In this episode of True Technologist, the inventors of the open source project Kubernetes, Craig McLuckie and Joe Beda, talk about the technology's benefits in the enterprise

sequence 01.00 01 56 13.still001
video

CIO Leadership Live with Cathie Kozik, CIO at PSAV | Ep 13

In this episode, host Maryfran Johnson talks with Cathie Kozik, senior vice president and CIO at PSAV, an events space provider, about aligning tech projects to business goals, tapping into employees for innovative ideas and using...

template c100.00 01 15 18.still001
video

Matei Zaharia, creator of the Apache Spark project, on the big data framework | True Technologist Ep 2

In this episode of True Technologist, host Eric Knorr talks with Matei Zaharia, chief technologist at Databricks and an assistant professor of computer science at Stanford, about the Apache Spark and Apache Mesos projects

nwan 019 iiot
video

What is IIoT?

The Industrial Internet of Things, or IIoT, is the application of instrumentation and connected sensors and other devices to machinery and vehicles. What that means in practice varies widely. Watch this 2-minute video to get up to...

template c100.00 00 18 11.still001
video

6 trends shaping IT cloud strategies today

From multi-cloud strategies to cost containment and container orchestration, CIOs are getting more pragmatic and prudent when taking advantage of the cloud’s economies of scale.

what is cloud native.00 00 22 14.still001
video

What is the cloud-native approach?

In this 60-second video, learn how the cloud-native approach is changing the way enterprises structure their technologies, from Craig McLuckie, founder and CEO of Heptio, and one of the inventors of open-source system Kubernetes

risk assessment - safety analysis - security audit

IT resiliency and the problem with SaaS: What is your risk profile?

Many organizations are recognizing that cloud providers are more equipped to handle security, maintenance and testing of a cloud environment, so they're offloading more responsibilities to these providers.

program dirty 2018.01.25 11.10.07.01 46 38 41.still002
video

Where blockchain's going this year

Blockchain has moved away from its cryptocurrency roots and is now being eyed as a platform for everything from global shipping to P2P cloud storage to real estate. Our Tech Talk panel looks at where it's going in 2018.

program dirty 2018.01.25 11.10.07.00 00 13 22.still003
video

TECH(talk): The coding benefits of serverless computing

The panel talks about serverless systems, which spin up a snippet of code that runs on demand to perform a business operation. It's a step toward a more developer-friendly approach to code development.

Load More