CLOUD & VIRTUALIZATION

Subscribe
 

Why Cloud Deployment Is at a Crossroads

Despite all the talk about the advantages of the cloud, most organizations have only progressed toward migration on a limited or experimental basis, according to a recent survey from Softchoice. The resulting “State of Cloud Readiness Study” indicates that the majority of IT decision-makers... Read More »

Nine Tips for Agile DDoS Protection

DDoS is a disruption that plagues digital businesses. Unfortunately, it is growing and evolving rapidly. First-generation DDoS detection techniques were limited by scale-up computing models. Now, new, scale-out, big data technologies are providing nearly limitless capacity to handle modern networks. As a result, "Savvy NetOps and SecOps teams are taking a less static and more adaptive stance... Read More »

What CIOs Need to Run a Hybrid IT Environment

While the vast majority of CIOs, tech managers and IT professionals said cloud deployment factors greatly into long-term business strategies, most do not expect to migrate all of their company's infrastructure to the cloud, according to a recent survey from SolarWinds. The resulting "Read More »

The Long Journey to Going Digital

Going digital means different things to different organizations, but there are several common elements to the process that all companies must address.

Read More »

Cloud Apps Rise Despite Cloud Security Concerns

Cloud computing spend grew 20 percent last year, but security of critical data and systems remain key issues and barriers to adopting cloud services. As a result, cloud security concerns are rising as investment in it grows, according to a new report by Crowd Research Partners, but that's not stopping companies from using the cloud. The study, "2016 Cloud Security Spotlight Report," was... Read More »

How More Cloud Services Put the Business at Risk

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from Softchoice. The report, titled Read More »

Outdated Security Creates an IoT Danger

The IT community must immediately address Internet of things security because there is a dire need for advanced security for agentless devices, a study revealed. IoT devices are often not addressed in companies' security policies, if indeed any policy exists. In addition, the perceived penetration by respondents of IoT devices is low and they are not confident that their perception is... Read More »

How Digital Assets Strain IT Security Efforts

A notable number of IT security professionals said a corporate mindset that current measures are “good enough” presents a major obstacle in the pursuit of new security initiatives, according to a recent survey from CompTIA. The resulting report, titled “Practices of Security... Read More »

Finding the Key to Unlock Data’s Potential

It's no secret that data increasingly defines the enterprise. In fact, a growing number of observers believe that it will emerge as a genuine currency in the years ahead. But putting it to maximum use and achieving optimal results remains a huge challenge. PwC's CEO Survey findings on “unlocking data... Read More »

4 Steps to Consider in a Cloud Integration Framework

The transition from only a handful of monolithic systems to a more disparate ecosystem of applications has made cloud integrations more challenging.

Read More »

Read More From Our Cloud & Virtualization Archive »