In the News
November 11, 2022
The successful scaling of the organization comes with new challenges and new opportunities for innovation. In particular, artificial intelligence for IT operations (AIOps) is on the rise as companies that operate large IT estates increasingly turn to automation for help with alert management and auto resolution of issues to maximize operational reliability and uptime.
October 6, 2022
As Forbes and others have reported, merger and acquisition (M&A) volume was unprecedented in 2021, and M&A activity so far this year remains brisk. As for what this trend means for cyber asset management, the answer can be summed up in one word: complexity.
September 19, 2022
What happens to a former employee’s digital access after they’ve parted ways with a company? Sorting out what clearances they had and then ensuring those rights and privileges are dealt with accordingly is a necessary part of offboarding a departing employee.
September 2, 2022
One of the most challenging aspects of cybersecurity is that it’s a moving target of ever-expanding threats and attack surfaces. Especially as enterprises cope with a post-pandemic era of remote work and online collaboration, they are expanding services and access across hybrid and multi-cloud enviromnents.
August 29, 2022
Americans are quitting their jobs at record numbers – but while business leaders focus on addressing the resulting labor shortages, they mustn’t neglect the critical risk that this phenomenon poses for company cybersecurity.
August 29, 2022
The pandemic spurred all companies to move to the cloud. But that doesn’t mean the job is done. Here are some tips to make the move less torturous, including commentary from CloudSphere’s Keith Neilson on slides 2 and 3.
August 28, 2022
In June 2022, Entrust began notifying customers that they suffered a cyberattack where data was stolen from internal systems. It appears that the number of malicious actors offering vulnerable network information have been tripling in the past few years, bringing to light the concerning fact that actors are aware of company breaches long before the company itself finds out.
August 25, 2022
Digital transformation is a well-established priority across many business sectors, yet even the most committed senior executives face a conundrum when it comes to following through. As a C-suite leader, you’re likely spread far too thin to be able to focus on the nuts and bolts of the modernization effort day in and day out.
August 17, 2022
As you may have heard, 8,000 internet-accessible VNC instances were exposed due to disabled authentication. With authentication disabled, malicious actors could potentially hijack these endpoints and the industrial control systems they’re often connected to.
August 11, 2022
The challenge with modern supply chains is one of multiple pressures hitting all at once. To be more resilient, many companies have opened the spigot on enterprise investment and technology innovation for supply chain modernization. But these efforts must be well-coordinated to be effective.
August 5, 2022
Keith Neilson, technical evangelist at CloudSphere, explains why HR needs to become more involved in cybersecurity.
July 27, 2022
PrestaShop, an open-source e-commerce platform hosting over 300,000 shops, announced attackers have exploited a major vulnerability to inject malicious code into servers running PrestaShop websites. Keith Neilson, CloudSphere’s Technical Evangelist, comments.
July 8, 2022
A payment vendor was hit with a ransomware attack back in February that may have exposed patient data from more than 600 healthcare providers and organizations.
July 6, 2022
The recent upheaval in the supply chain is unprecedented, thanks to ongoing disruptions tied to the pandemic, financial and trade sanctions stemming from Russia’s war in Ukraine, cyberattacks targeting the supply chain and other factors. In this article, Keith Neilson explores how better cyber asset management is the key to striking the optimal balance.
July 6, 2022
Whether it’s through stolen credentials, phishing attacks or simply user errors, people continue to pose the greatest risk to cybersecurity. In this Help Net Security video, Keith Neilson, CloudSphere’s Technical Evangelist, illustrates how the key to ensuring security in these vulnerable scenarios lies in cyber asset management.
June 28, 2022
Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable.
June 3, 2022
One of the biggest C-suite mandates today is to keep a finger on the pulse of business conditions to safeguard operations and manage risk. And while there are many candidates for that senior-level attention, data privacy has become one of the most consequential factors affecting business conditions today.
May 26, 2022
Supply chain headaches aren’t going away anytime soon, with experts predicting that disruptions will continue well beyond 2022. The crisis has left many firms struggling with where to start, and what to focus on in reclaiming a sense of security and resilience.
March 20, 2022
Keith Neilson, Technical Evangelist at CloudSphere joins Neil C. Hughes to discuss how companies can maintain a competitive edge and keep company data secure by leveraging a more agile cyber asset management approach.
March 18, 2022
One of the key things to understand about cloud migration is that although such migrations may seem very project-oriented—with distinct phases and move groups of systems going into the cloud—the outcome of this modernization is a permanent shift in how the business is run.
February 24, 2022
Keith Neilson, Technical Evangelist at CloudSphere, talks with Dez Blanchfield about our recent Amazon Web Services (AWS) Migration and Modernization Competency. Learn what this achievement means to our customers and much more.
February 24, 2022
In this article, CloudSphere CEO Jane Gilson examines how cyber asset management can play a role in mitigating risk and maximizing operational efficiency by maturing our approach to cloud tagging and metadata management.
February 17, 2022
Cloud migrations have always been tricky, but COVID-19 has made them more so. This article examines some of the main reasons cloud migrations get stalled, and how to go about jump-starting those efforts.
January 28, 2022
Data Privacy Day is a day to celebrate the importance of data privacy and the very real advances that have been made by enterprises to ensure it. On the other hand, it’s a day to recognize the remaining data privacy risks – and redouble efforts to mitigate them.
January 24, 2022
insideBIGDATA’s Heard on the Street round-up column features thought-leadership commentaries from members of the big data ecosystem. In this edition, experts discuss that while the pandemic presented many challenges, there was also an upside to the data tsunami that COVID-19 created for organizations that rely on data to inform business decisions.
January 17, 2022
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
November 3, 2021
In the organizational haste to move to the cloud, many companies skipped the prerequisite steps of understanding how their on-premises systems would translate with regards to security and compliance.
September 17, 2021
2021 is set to be the “year of multi-cloud,” as more than 90% of enterprises worldwide are projected to rely on a mix of private clouds, public clouds, and legacy platforms by 2022. However, this race to adoption is leaving many organizations unprepared for the important task of implementing a multi-cloud strategy.
August 25, 2021
While the likes of Google and We Work became known for their amenities and open workspaces over the past few years, Covid-19 has fast-tracked the evolution of the workplace and leadership practices at a pace I have never before encountered.
May 7, 2021
While cloud-native services present some customer-friendly benefits, organizations must recognize that the built-in measures typically lead to more security misconfigurations, less network visibility, and overprovision access.
May 7, 2021
Unauthorized cloud access is a lingering and growing concern for security teams overseeing intricate, multi-cloud environments. To thwart common pitfalls, IT leaders must improve IAM policies, limit misconfigurations, and reduce internal privileges.
March 25, 2021
CIOs must create a culture centered around cybersecurity that is easily visible and manageable.
March 8, 2021
Last month we reported on public sector organizations suffering from cloud leakage. A new report out today shows that this is an issue in the private sector too.
March 4, 2021
A new report conducted by Dimensional Research revealed that 32% of enterprises experienced unauthorized access to cloud resources, and another 19% were unaware if unauthorized access occurred.
January 26, 2021
On January 26, CloudSphere (a cloud governance platform) announced that former Google and Microsoft executive, Jane Gilson, is their new CEO.
December 1, 2020
Enterprises have shown renewed interest in cloud migration to drive revenue. CloudSphere delivers a single platform that maps dependencies and servers to optimize those migration pathways to single cloud or multicloud environments.
October 26, 2020
A large data breach has been suffered by the Nitro PDF service. The data loss has impacted many large technology organizations, including Google, Apple, Microsoft, Chase, and Citibank.
October 22, 2020
With more organizations shifting to cloud services in the pandemic, experts say the traditionally manual process of securing them will be replaced by automated tools in 2021 and beyond.
October 18, 2020
A database of more than 350 million customer records belonging to voice over-internet-protocol company Broadvoice has been found exposed online in the latest case of a company failing to secure its cloud storage.
TRUE, a privacy-oriented social media app owned by US mobile carrier Hello Mobile, leaked personal details of tens of thousands of users by failing to secure a dashboard that contained email addresses and phone numbers of users as well as their private chats, private posts, and last-known geolocation.