Cloud

Model Context Protocol (MCP) for Enterprises: Secure Integration with AWS, Azure, and Google Cloud- 2025 Update
The Model Context Protocol (MCP), open-sourced by Anthropic in November 2024, has rapidly become the cross-cloud standard for connecting AI agents to tools, services, and data across the enterprise landscape. Since its release, major cloud vendors and leading AI providers have shipped first-party MCP integrations, and independent platforms are quickly expanding the…

Cloud quantum computing: A trillion-dollar opportunity with dangerous hidden risks
Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Quantum computing (QC) brings with it a mix of groundbreaking possibilities and significant risks. Major tech players like IBM, Google, Microsoft and Amazon have already rolled out commercial QC cloud services, while…

Asset sprawl, siloed data and CloudQuery’s search for unified cloud governance
Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more Gaining visibility — and, ultimately, insights — into enterprise cloud assets is growing ever more challenging. Cloud estates are sprawling and fragmented, and inventory capabilities in existing tools can be narrow and…

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security
Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams known as “pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to…

RAID Recovery in the Cloud Era: Hybrid Solutions When Your Physical RAID Server Fails
The sad truth is that RAID levels are not immune to data loss in critical scenarios – they only provide a safeguard in minor situations such as drive failures and inaccessible volumes. If your system crashes due to a virus attack or a problem with the operating system, chances are your RAID array will fail…

HPE strengthens hybrid cloud and connectivity with Aruba Networking and GreenLake security upgrades – Help Net Security
Hewlett Packard Enterprise has announced expansions of HPE Aruba Networking and HPE GreenLake cloud to help enterprises modernize secure connectivity and hybrid cloud operations by blending multi-layered and zero trust approaches to protect against threats. These new expansions include: New cloud-based access control security capabilities of HPE Aruba Networking Central, which accelerate enterprise-grade zero trust…

Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security
As cloud-native architectures continue to evolve, so have the complexities of securing them. Traditional security approaches, often built around static infrastructure and perimeter defenses, struggle to keep pace with the speed and scale of modern cloud deployments. Enter cloud-native application protection platforms (CNAPPs), a term coined by Gartner® to describe an integrated security approach that…

SaaS Security Essentials: Reducing Risks in Cloud Applications
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection, sensitive data, user access, and cloud infrastructure are left vulnerable to breaches. SaaS security is not a single-layer fix; it demands multiple approaches to address cybersecurity threats across identity, data, and applications. Key Components of…

Cloud IMS: The Confluence of Innovation and Security in Modern Telecommunications
The telecom industry is at a major turning point. With 5G, IoT, and AI reshaping global connectivity, the need for scalable, secure, and smart networks is higher than ever. Cloud IMS is stepping up as a game-changer, combining the flexibility of cloud technology with the reliability of traditional IMS systems. Virtualizing core network functions helps…

How CISOs can balance security and business agility in the cloud – Help Net Security
In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also offers practical strategies for integrating cloud-native security solutions and mitigating misconfigurations at scale. What key security principles should enterprises follow when migrating…
- 1
- 2