Sicurezza

Economics of Load Balancing When Transitioning to the Cloud

Pubblicato il

One of the concerns I hear often is that application delivery controller (ADC) licensing models do not support cloud transitions for the enterprise or address the business needs of cloud service providers that have a large number of tenants. Of course, there are many models to choose from – perpetual pricing per instance, bring-your-own license […]

Sicurezza

Managing Security Risks in the Cloud

Pubblicato il

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That’s a problem. If your organization does not have the ability to identify its assets, threats, and vulnerabilities accurately, you’re going to have a bad time. A lack of visibility prevents both IT and […]

ICT

OCID19: intervista a Lorenzo Anzola, CIO di Mapei

Pubblicato il

Il passaggio al cloud come opportunità, ma da valutare attentamente: intervista a Lorenzo Anzola, CIO Mapei, all’Oracle Cloud Innovation Day 2019. The post OCID19: intervista a Lorenzo Anzola, CIO di Mapei appeared first on Punto Informatico.

ICT

Cloud Generation 2, performance e sicurezza

Pubblicato il

La nuova generazione delle soluzioni cloud è pensata per assicurare non solo performance, ma anche un adeguato livello di sicurezza dei dati. The post Cloud Generation 2, performance e sicurezza appeared first on Punto Informatico.

ICT

Antstream: come Stadia, ma per nostalgici

Pubblicato il

Una piattaforma per giocare in streaming, come Stadia o PS Now, ma interamente dedicata agli amanti del retrogaming: ecco il progetto Antstream. The post Antstream: come Stadia, ma per nostalgici appeared first on Punto Informatico.

Sicurezza

Anatomy of a Cloud-Native Data Breach

Pubblicato il

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a real-life example of a cloud-native data breach, how it evolved and how it […]