The Rise Of AIOps Is Raising The Bar For Cyber Asset Management
November 11, 2022
The successful scaling of the organization comes with new challenges and new opportunities for innovation. In particular, artificial intelligence for IT operations (AIOps) is on the rise as companies that operate large IT estates increasingly turn to automation for help with alert management and auto resolution of issues to maximize operational reliability and uptime.
Planning A Merger Or Acquisition? Make Sure To Plan Your Cyber Asset Management Strategy First
October 6, 2022
As Forbes and others have reported, merger and acquisition (M&A) volume was unprecedented in 2021, and M&A activity so far this year remains brisk. As for what this trend means for cyber asset management, the answer can be summed up in one word: complexity.
Two-Minute Toolkit: CloudSphere on Cybersecurity and Offboarding
September 19, 2022
What happens to a former employee’s digital access after they’ve parted ways with a company? Sorting out what clearances they had and then ensuring those rights and privileges are dealt with accordingly is a necessary part of offboarding a departing employee.
The Importance of Building a Strong Cyber Asset Management Plan
September 2, 2022
One of the most challenging aspects of cybersecurity is that it’s a moving target of ever-expanding threats and attack surfaces. Especially as enterprises cope with a post-pandemic era of remote work and online collaboration, they are expanding services and access across hybrid and multi-cloud enviromnents.
Great Resignation and Offboarding: Addressing the Cyber Asset Management Risk
August 29, 2022
Americans are quitting their jobs at record numbers – but while business leaders focus on addressing the resulting labor shortages, they mustn’t neglect the critical risk that this phenomenon poses for company cybersecurity.
Cloud Migration: 9 Ways to Ease the Agony
August 29, 2022
The pandemic spurred all companies to move to the cloud. But that doesn’t mean the job is done. Here are some tips to make the move less torturous, including commentary from CloudSphere’s Keith Neilson on slides 2 and 3.
Holistic Approach is Needed to Defend Firms from Cyberattacks
August 28, 2022
In June 2022, Entrust began notifying customers that they suffered a cyberattack where data was stolen from internal systems. It appears that the number of malicious actors offering vulnerable network information have been tripling in the past few years, bringing to light the concerning fact that actors are aware of company breaches long before the company itself finds out.
To Keep Digital Transformation On Track, Senior Leaders Need A Modernization Mindset
August 25, 2022
Digital transformation is a well-established priority across many business sectors, yet even the most committed senior executives face a conundrum when it comes to following through. As a C-suite leader, you’re likely spread far too thin to be able to focus on the nuts and bolts of the modernization effort day in and day out.
Expert Commentary: Thousands Of Exposed VNC Instances Exposed
August 17, 2022
As you may have heard, 8,000 internet-accessible VNC instances were exposed due to disabled authentication. With authentication disabled, malicious actors could potentially hijack these endpoints and the industrial control systems they’re often connected to.
Threading the Needle on Supply Chain Modernization: Reaping Value Without the Risk from New Technologies with Cyber Asset Management
August 11, 2022
The challenge with modern supply chains is one of multiple pressures hitting all at once. To be more resilient, many companies have opened the spigot on enterprise investment and technology innovation for supply chain modernization. But these efforts must be well-coordinated to be effective.
HR and Cybersecurity
August 5, 2022
Keith Neilson, technical evangelist at CloudSphere, explains why HR needs to become more involved in cybersecurity.
Major Security Vulnerability In Prestashop Platform
July 27, 2022
PrestaShop, an open-source e-commerce platform hosting over 300,000 shops, announced attackers have exploited a major vulnerability to inject malicious code into servers running PrestaShop websites. Keith Neilson, CloudSphere’s Technical Evangelist, comments.
More than 600 Providers Impacted by Ransomware Attack on Payment Vendor
July 8, 2022
A payment vendor was hit with a ransomware attack back in February that may have exposed patient data from more than 600 healthcare providers and organizations.
The Cyber-Asset Management Playbook for Supply Chain Modernization
July 6, 2022
The recent upheaval in the supply chain is unprecedented, thanks to ongoing disruptions tied to the pandemic, financial and trade sanctions stemming from Russia’s war in Ukraine, cyberattacks targeting the supply chain and other factors. In this article, Keith Neilson explores how better cyber asset management is the key to striking the optimal balance.
How a Cyber Asset Management Strategy Can Help Enterprises Detect Threats
July 6, 2022
Whether it’s through stolen credentials, phishing attacks or simply user errors, people continue to pose the greatest risk to cybersecurity. In this Help Net Security video, Keith Neilson, CloudSphere’s Technical Evangelist, illustrates how the key to ensuring security in these vulnerable scenarios lies in cyber asset management.
Flagstar bank data breach: Where next for financial cybersecurity?
June 28, 2022
Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable.
Three Pillars For The C-Suite Playbook On Data Privacy: A Cyber Asset Perspective
June 3, 2022
One of the biggest C-suite mandates today is to keep a finger on the pulse of business conditions to safeguard operations and manage risk. And while there are many candidates for that senior-level attention, data privacy has become one of the most consequential factors affecting business conditions today.
The Road to Supply Chain Resilience is Paved with Cyber Asset Management
May 26, 2022
Supply chain headaches aren’t going away anytime soon, with experts predicting that disruptions will continue well beyond 2022. The crisis has left many firms struggling with where to start, and what to focus on in reclaiming a sense of security and resilience.
How to Avoid Hasty Cloud Migrations
March 20, 2022
Keith Neilson, Technical Evangelist at CloudSphere joins Neil C. Hughes to discuss how companies can maintain a competitive edge and keep company data secure by leveraging a more agile cyber asset management approach.
How to Promote a Culture of Modernization: The Real Future of Work
March 18, 2022
One of the key things to understand about cloud migration is that although such migrations may seem very project-oriented—with distinct phases and move groups of systems going into the cloud—the outcome of this modernization is a permanent shift in how the business is run.
CloudSphere Achieves Amazon Web Services (AWS) Migration and Modernization Competency for Discovery and Planning
February 24, 2022
Keith Neilson, Technical Evangelist at CloudSphere, talks with Dez Blanchfield about our recent Amazon Web Services (AWS) Migration and Modernization Competency. Learn what this achievement means to our customers and much more.
Maturing The Cyber Asset Management Playbook For Multicloud Systems
February 24, 2022
In this article, CloudSphere CEO Jane Gilson examines how cyber asset management can play a role in mitigating risk and maximizing operational efficiency by maturing our approach to cloud tagging and metadata management.
Three Ways to Get a Stalled Cloud Migration Back on Track
February 17, 2022
Cloud migrations have always been tricky, but COVID-19 has made them more so. This article examines some of the main reasons cloud migrations get stalled, and how to go about jump-starting those efforts.
For Cloud Adopters, Data Privacy Day Is an Occasion for Both Hesitancy and Hope
January 28, 2022
Data Privacy Day is a day to celebrate the importance of data privacy and the very real advances that have been made by enterprises to ensure it. On the other hand, it’s a day to recognize the remaining data privacy risks – and redouble efforts to mitigate them.
COVID-19 – A Data Tsunami That Ushered in Unprecedented Opportunities for Businesses and Data Scientists
January 24, 2022
insideBIGDATA’s Heard on the Street round-up column features thought-leadership commentaries from members of the big data ecosystem. In this edition, experts discuss that while the pandemic presented many challenges, there was also an upside to the data tsunami that COVID-19 created for organizations that rely on data to inform business decisions.
Mastering the Art of Cloud Tagging Using Data Science
January 17, 2022
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
Playing Catchup After Implementing Accelerated Pandemic Cloud Strategies
November 3, 2021
In the organizational haste to move to the cloud, many companies skipped the prerequisite steps of understanding how their on-premises systems would translate with regards to security and compliance.
The 3 Fatal Errors to Multi-Cloud Adoption
September 17, 2021
2021 is set to be the “year of multi-cloud,” as more than 90% of enterprises worldwide are projected to rely on a mix of private clouds, public clouds, and legacy platforms by 2022. However, this race to adoption is leaving many organizations unprepared for the important task of implementing a multi-cloud strategy.
What Business Leaders Need To Know About the Future of Hybrid Work Models
August 25, 2021
While the likes of Google and We Work became known for their amenities and open workspaces over the past few years, Covid-19 has fast-tracked the evolution of the workplace and leadership practices at a pace I have never before encountered.
Cloud-Native Security – Should Organizations Be Wary of the Hype?
May 7, 2021
While cloud-native services present some customer-friendly benefits, organizations must recognize that the built-in measures typically lead to more security misconfigurations, less network visibility, and overprovision access.
Spring Cleaning: Tidying Up Unauthorized Access in Multi-Cloud Configurations
May 7, 2021
Unauthorized cloud access is a lingering and growing concern for security teams overseeing intricate, multi-cloud environments. To thwart common pitfalls, IT leaders must improve IAM policies, limit misconfigurations, and reduce internal privileges.
The CIO’s Shifting Role: Improving Security with Shared Responsibility
March 25, 2021
CIOs must create a culture centered around cybersecurity that is easily visible and manageable.
A Third of Enterprises Suffer Unauthorized Cloud Access
March 8, 2021
Last month we reported on public sector organizations suffering from cloud leakage. A new report out today shows that this is an issue in the private sector too.
32% of Enterprises Experienced Unauthorized Access to Cloud Resources
March 4, 2021
A new report conducted by Dimensional Research revealed that 32% of enterprises experienced unauthorized access to cloud resources, and another 19% were unaware if unauthorized access occurred.
Former Google and Microsoft Executive Joins CloudSphere to Become Their First Female CEO
January 26, 2021
On January 26, CloudSphere (a cloud governance platform) announced that former Google and Microsoft executive, Jane Gilson, is their new CEO.
How CloudSphere’s Management Platform Delivers Unified Context for Multi-Cloud App and Server Environments
December 1, 2020
Enterprises have shown renewed interest in cloud migration to drive revenue. CloudSphere delivers a single platform that maps dependencies and servers to optimize those migration pathways to single cloud or multicloud environments.
Massive Nitro Data Breach Impacts Microsoft, Google, and Apple
October 26, 2020
A large data breach has been suffered by the Nitro PDF service. The data loss has impacted many large technology organizations, including Google, Apple, Microsoft, Chase, and Citibank.
Need for ‘Guardrails’ in Cloud-Native Applications Intensifies
October 22, 2020
With more organizations shifting to cloud services in the pandemic, experts say the traditionally manual process of securing them will be replaced by automated tools in 2021 and beyond.
VOIP Provider Broadvoice Exposes 350M Customer Records on Elasticsearch Cluster
October 18, 2020
A database of more than 350 million customer records belonging to voice over-internet-protocol company Broadvoice has been found exposed online in the latest case of a company failing to secure its cloud storage.
Privacy-focused Social App True Exposed Users’ Private Chats and Geolocation
TRUE, a privacy-oriented social media app owned by US mobile carrier Hello Mobile, leaked personal details of tens of thousands of users by failing to secure a dashboard that contained email addresses and phone numbers of users as well as their private chats, private posts, and last-known geolocation.