Category Archives: Cloud Computing

Cloud computing is changing everything about IT skills. Here’s what that means for your job – ZDNet

Cloud adoption is booming, with low-code and automation tools having proved extremely popular in the past two years.

Multi-cloud is increasingly winning favour among organizations looking to diversify their technology stacks and pick and choose cloud-computing services from different providers according to their needs.

Managing the Multicloud

It's easier than ever for enterprises to take a multicloud approach, as AWS, Azure, and Google Cloud Platform all share customers. Here's a look at the issues, vendors and tools involved in the management of multiple clouds.

Read More

As businesses increasingly shift their infrastructures, employees will likewise require a broader range of technical skills.

SEE:Remote working jobs row shows how much tech has changed

Milind Govekar, chief of research at Gartner, says one of the biggest changes in the workforce will come as organizations lean harder into automation -- which he calls "the centrepiece" of cloud business strategies.

"Automation changes the entire mindset of the IT organization, particularly the infrastructure and operations organization, where they need to stop being administrators and become programmers -- completely different skillsets," Govekar tells ZDNet.

Automation has spiked in popularity in response to the digital skills gap and businesses' need to launch digital services quickly because of the pandemic.

Low-code and no-code tools, for example, have become a favourite among businesses that need to get products and services onto the cloud quickly. Gartner believes this popularity will continue, and predicts that the use of low-code and no-code tools will triple by 2025.

Low-code and no-code tools may prove to be useful assets for administrators juggling multi-cloud environments, but this doesn't necessarily equate to a downturn in the need for traditional software development and coding skills.

"More than ever there's a huge demand for software skills, especially to solve complex problems -- many of which cannot be solved singlehandedly by low-code tools," says Tracy Woo, senior analyst at Forrester.

Using low-code tools frees up experts on tech teams to focus on more advanced issues and services, says Woo: "This in turn means that skill sets required will focus on expertise or comfort with these tools along with overall comfort and experience with managing and handling cloud environments."

Increased automation as a result of cloud adoption may, however, lead to a reconfiguration of other roles and responsibilities. For instance, as routine tasks increasingly become automated, workers previously charged with administrative, monitoring or maintenance duties may be reskilled, or deployed elsewhere.

According to Pega's November 2021 Future of IT report, automation could also make it more difficult for managers to rise through the ranks. With so many tasks being automated or outsourced to the cloud, IT management as a competency will either disappear or become less relevant, it says. This was the opinion of more than 40% of the 750 IT leaders surveyed by the software company.

The upshot, says Pega, is more time to spend on creative work, while "changes to the nature of their work mean jobs will still feel easier and more streamlined."

The report adds: "Many different technology trends, including intelligent automation and data analytics, are fuelling a reduction in workload. Time saved will be used to make a bigger impact through strategic deployment of tech to solve business problems."

Non-IT employees will also require better knowledge of cloud tools, particularly as remote working becomes commonplace.

A recent report by Amazon Web Services (AWS) found that cloud dominated the list of key digital skills employers say will be most in-demand by 2025. And yet it found that just 45% of workers have trained or are training in cloud skills.

More advanced cloud skills will also be in high demand, such as the ability to move organizations from on-premises facilities to the cloud (cloud migration), as well as cloud architecture expertise. Just 16% and 15% of workers are trained in these areas respectively, AWS found.

"Applications are shifting from monolithic apps to multi-tiered line-of-business apps that use smaller units of code that developers can both scale and modify independently," says Woo.

"As a result, companies are looking for automation skills, familiarity with continuous integration and continuous delivery tooling, knowledge of infrastructure-as-code solutions, and those that can collaborate closely among the app developers and infrastructure teams, as each will need to lean on and learn from each other coding and infrastructure principles."

SEE:Digital transformation is changing what it means to work in tech

Govekar believes the biggest challenge for business leaders now is to anticipate the skills they will need in the future and the roles that will be key to the organization several months, or even years, down the line.

"Recruiters often talk about back filling roles. For cloud, you need to do forward filling," he says.

Forward filling means looking and recruiting for skills that you are going to need in the future.

This requirement is likely to present an exceptional recruitment challenge for companies who are already struggling to fill critical IT and tech roles, particularly as many business leaders appear reluctant to invest in upskilling their existing workforces.

"Very few organizations are putting aside money for that kind of training," Govekar adds. "Many organizations are finding it very difficult to understand what the balance is between doing [training] on the job, versus taking a more systematic approach.

"I was talking to another organization recently who said, 'The moment I upskill and train my person in AWS and Google or Azure, or anything else, they are [offered] more somewhere else -- I am literally training them up for someone to grab."

More here:
Cloud computing is changing everything about IT skills. Here's what that means for your job - ZDNet

What is ‘The Cloud’ and How Does it Pervade Our Lives? – Scientific American

Youre surrounded by it.

You cant send an e-mail without touching it.

You cant watch your favorite streaming series without welcoming it into your home.

You dont know where youre going, but its tracking your every move and telling you to turn left.

It is the cloud, and whether you realize it or not, it has probably taken over your digital life.

But what is the cloud actually?

The cloud is a system of millions of hard drives, computer servers, signal routers and fiber-optic cables.

These elements are, in a way, like the water droplets, ice crystals and aerosols that make up a true cloud.

They are nebulous. They are constantly shifting. But they are in close connection with one another over large distances of space and time.

The clouds true purpose is to float unseen all around us, silently, creating ever present connectivity.

And just like a real cloud, it can bring benefitsand danger. The cloud is making services more affordable and accessible to people all over the world. It helps businesses update products for their customers and enables remote work across industries. But it also opens us up to behavior tracking at each and every Web site we visit. It can put our virtual privacy in the hands of tech giants. And should the cloud ever fail, our increasing, mostly unknowing dependency on it will become painfully clear.

To understand why, lets take a step back to the early days of the cold war with the Soviet Union.

After the Soviets beat the Americans to space in 1957, the U.S. Department of Defense decided it needed to work harder on research and development. The following year, it formed the Advanced Research Projects Agency. That agency would create the rough draft of the Internet a decade later. It was called ARPANET, and it connected four university computers via telephone lines.

ARPANET was the offspring of a novel and controversial view of computers championed by engineer and psychologist J.C.R. Licklider.

In 1962 Licklider, known as Lick, was put in charge of the agencys Information Processing Techniques Office. And with his budget, he advanced a view of these machines that was very different from that of his peers.

Lick didnt believe in building new computers for every project. Instead he wanted to consolidate resources into a network of thinking centers that individuals could access as needed. This vision, which became the basis for ARPANET and later the Internet, is the premise of cloud computing.

When you access data on the Internet, youre actually requesting files from a server. The files are broken into tiny packets of information, which may travel together or take completely different routes back to your device, where theyre reassembled. The particulars may get a bit complicated, but all that really matters is that youre connected to the network.

One of the firstvisual representations of a network as a cloud comes from 1971.

The previous year, telecom giant AT&T introduced Pittsburgh to the Picturephone, a kind of early videoconferencing system. It was meant to run over digital systems and phone lines. In 1971 Irwin Dorros, then at the companys Bell Telephone Laboratories, published a schematic of the system.

It showed a couple of cloudlike shapes that would tie together the hardware neededeven if Dorros didnt know which computers or phone lines would be working together at any one time.

By the early 1990s, engineers had gotten used to referring to the Internet this way. But the idea of cloud computing really went mainstream in the 2000s. In March 2006 Amazon launched its first cloud-based service as part of its Amazon Web Services, or AWS.

Initially, Amazon just planned to build a platform to help other companies set up online shops. But it quickly started to recognize that many of the tools and databases it was building could be useful outside of e-commerce.

Amazon began renting out server space and database tools that allowed companies to launch and maintain applications much more cheaply than starting from scratch. For instance, Zillow, the online real estate Web site, uses AWS to store 100 terabytes of house pictures and data rather than maintaining the necessary servers itself.

Using an outside server can be safer than managing your own, because its much less likely to overload, and many of these servers will back up your files for you. Most cloud computing services also come with optimization tools to handle traffic spikes and lulls, and many have data centers around the world, making sites load faster for international users.

The cloud can also give you access to more computational power than you can easily get on your own, letting you effectively use a supercomputer from your smartphone.

Cloud services generally fall into three categories: software, platforms and infrastructure.

Cloud-based software are just applications that run on the Internet so users dont have to download anything. This category is especially popular for widely used programs such as the instant messaging platform Slack or the file sharing app, Dropbox.

Next, cloud platforms, such as Googles App Engine, are digital environments that developers build their software to run on.

Last, cloud infrastructure provides server space that a customer manages remotely.

Consolidating the digital world onto a few powerful servers is extremely efficient. And the cloud brings us unprecedented connectivity. Its the basis for the Internet of Things, in which embedded sensors connect physical objects such as farm vehicles or building thermostats to the Internet. Once connected to the cloud, all of these things can act autonomouslydoing work for us without human intervention.

But while the cloud can make our jobs more efficient and our lives more flexible, we pay for those privileges with our data and security. With every action we take online, we hand personal information to companies trying to maximize how much they can profit on us. Many Web sites and apps regularly track our digital movements and sell those data to marketers. Cloud service providers can also collect data from applications built on their servers. This is often done to monitor efficiency, but some worry the data could be abused.

As we connect more of our daily lives to the cloud, we become reliant on a network that controls everything from who we meet on dating apps to whether our credit cards work.

We also lose sight of how fragile the system is. The cloud only exists because of physical parts, such as paper-thin fiber-optic wires that are easily damaged and degrade over time. And when software issues from a company youve never heard of can knock huge chunks of the Internet offline, its hard not to wonder if weve made a bad bargain.

Read more here:
What is 'The Cloud' and How Does it Pervade Our Lives? - Scientific American

How are Organizations Doing with Cloud? – InformationWeek

Enterprises continue to flock to the cloud, anxious to eliminate huge capital expenses in data centers -- but should we demand more from cloud providers?

Its no secret that cloud services providers are prime targets for hackers, and that they can also make mistakes that invite security breaches and data theft.

In 2020, disgruntled Amazon employees released a number of Amazon customer email addresses to third parties.In 2021, Microsoft warned thousands of its Azure cloud computing customers about a vulnerability that left their data completely exposed for the last two years.

Many cloud providers include disclaimers in their contracts for any data loss that clients might experience. If you are a small or mid-sized company, you don't have much leverage to renegotiate these boilerplate provisions, so you are left in a position of both trusting the cloud provider and hoping that your data isn't exposed.

It wasnt that long ago that a public cloud provider shared with me that cloud services platforms were notorious for shortcutting on security and governance practices. So where does that leave their clients?

One step cloud users can take is to ensure that their own liability insurance covers a data breach incident on the cloud. Another step is to thoroughly review a cloud providers guarantees on security and governance before entering into any contract. A third step is to play a more active role in managing and enforcing your own security and governance over your IT assets in the cloud.

All of these steps assist in bullet-proofing cloud users from the cloud security breaches that could occur in the future.

The message for cloud providers is to improve their security and governance practices so clients can feel more comfortable.

The complexity of cloud pricing models can make CIOs long for the days of the internal data center with its fixed, discretionary and amortized costs.

Jonathan Shanks, CEO and co-founder of Kubernetes delivery platform Appvia, discusses a cloud scenario in which four separate cloud platforms, each with its own pricing structure, were engaged.

Lets take a look at AWS Lambda as an example, said Shanks. Imagine you have a web application using the CloudFront CDN [content delivery network]. When a user interacts with the application it triggers a HTTP request through an API gateway that invokes a Lambda function that takes in the data and stores it in DynamoDB.

The requirement here seems quite straightforward. However, you're now consuming four AWS cloud services: CloudFront CDN for caching, API Gateway for routing the HTTP requests, Lambda for execution and handling the request, and DynamoDB for storing data based on that request made by the user. Each of these has its own pricing structure, with some free tiers mixed in.

Needless to say, its difficult to decipher the bill and to understand what youre really paying for -- and its a major reason why one-third of companies are overrunning their cloud budgets by 40%.

Cloud services providers should simplify billings so clients know what they are paying for and can make informed decisions at budget time.

The process for managing a cloud budget as it stands wastes tons of time and resources, said Shanks. Its riddled with frustrations and inefficiencies that are damaging to morale and the operation of teams.

Many organizations offload resources to the cloud and then let cloud services providers manage these resources. When companies make these decisions, they have no guarantee that the cloud provider will manage their resources with the same best practice and security/governance guidelines that the companies would use themselves if they managed these resources in-house.

I don't know why companies complain about this, said one major cloud provider spokesperson to me in this year. If our clients looked at all of the ways and tools that we give them in the cloud to manage their own security and governance and took advantage of these tools, there wouldnt be a problem.

The spokesperson is right. There isn't a single major cloud platform that doesnt offer a plethora of security and governance tools that clients can use.

The problem is many cloud clients arent aware of these tools.

Cloud providers can help by discussing the security and governance tools that are available to clients at the time that contracts are entered into or renewed.

Hybrid computing, characterized by a mix of on-premises IT and multiple clouds, is here to stay. Within this fluid environment, it will be necessary for companies to move from cloud to cloud and in some cases, to terminate cloud services.

The challenge here for companies is the same challenge that they faced whenever computer brands are changed: vendor lock-in.

Companies can help themselves by continuously backing up data that they cloud-host, so they have a current copy of the data that is non-cloud-resident; or by ensuring that multiple copies of the same data are on multiple cloud platforms. For this strategy to work, data must be kept in a standard data format that most clouds understand.

As for cloud providers, it is to their advantage to coexist with other cloud platforms, because their clients certainly will.

Read this article:
How are Organizations Doing with Cloud? - InformationWeek

Cyber Security Today, Dec. 1, 2021 – The FBI seizes alleged ransomware gang member’s funds, a cloud computing security report from Google and more -…

The FBI seizes alleged ransomware gang members funds, a cloud computing security report from Google and more malware found in the Android store.

Welcome to Cyber Security Today. Its Wednesday, December 1st. Im Howard Solomon, contributing writer on cybersecurity for ITWorldCanada.com.

The FBI continues to make some progress against ransomware groups. According to the Bleeping Computer news service, the feds seized bitcoin worth just over $2 million in August from a digital wallet in Texas. The money is allegedly traceable to attacks carried out by the REvil ransomware gang. The digital wallet allegedly belongs to a resident of Russia.

Separately, a report from the NCC Group says the use by ransomware gangs of the double extortion tactic is going up. In October there were 314 double-extortion victims around the world, an increase of 65 per cent over September. Double-extortion is stealing some data and threatening to release it to the public or sell it to other crooks in addition to encrypting the rest of an organizations data. The report also notes that one threat actor, dubbed SnapMC, doesnt bother encrypting data. It only steals data and holds it for ransom.

Cloud computing has several advantages for IT departments. One is that they dont have to worry about rushing to install security updates. The cloud application provider Gmail, Salesforce, Microsoft 365 finds bugs and installs updates fast. However, organizations still have to make sure their systems arent vulnerable to misconfigurations and other errors by employees. In its first cloud threat intelligence report Google says many successful attacks on applications are caused by poor cyber hygiene and a lack of basic security controls. What kinds of problems can happen? Looking at its own service, the report says 86 per cent of compromised Google Cloud Platform instances were used for stealing compute cycles for cryptocurrency mining. Other abuses of Google Cloud included using resources to scan targets, to launch cyberattacks and to host malware. Forty-eight per cent of compromises were blamed on customer accounts that had either no password or a weak password. Another 26 per cent of compromises were due to vulnerabilities in third-party software that organizations installed themselves. One piece of advice Google offers for better security of its cloud customers applies to users of any cloud service: Employees should have to use two-factor authentication for logins. Google also provides a range of security services such as web scanning, a security command center and other capabilities. When IT departments look for cloud providers they should ask if similar services are available and what they cover.

Ive said before that Google makes good efforts to keep malware out of the Android Play store. However, cyber crooks try just as hard to squirm past defences. A report this month from a Dutch cybersecurity company called Threat Fabric shows how some groups do it. They create mobile apps that include a dropper. A dropper is a small piece of code that calls back to a crooks server to download malware onto a victims device. The small size of the dropper code makes it hard to detect. Researchers at Threat Fabric recently discovered 11 apps in the Play store able to infect victims Android devices with dozens of pieces of malware aimed at stealing bank login passwords. Threat Fabric believes the malware has been downloaded over 300,000 times. As is often the case these bad apps pretend to be utilities like QR code scanners, PDF scanners, cryptocurrency apps and fitness trainers. Crooks know that many people love finding new apps to play with on their smart phones. Always remember that when you want to download an app. Be sure from reading reviews and talking to people you trust that an app is trustworthy.

Thats it for now Remember links to details about podcast stories are in the text version at ITWorldCanada.com.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

See the rest here:
Cyber Security Today, Dec. 1, 2021 - The FBI seizes alleged ransomware gang member's funds, a cloud computing security report from Google and more -...

Sidero CTO: Why multi-cloud strategies are on the rise – Siliconrepublic.com

Sideros Joe Dowling discusses the growth of multi-cloud strategies and the importance of practising what you preach when it comes to digital transformation.

With 30 years experience in the technology industry, Joe Dowling is the newly appointed chief technology officer of Athlone-based software and cloud company Sidero.

Last month, the company announced plans to create 75 new jobs at its Athlone base over the next two years, with new roles primarily in the cloud and software development sectors in response to increasing demand for digital transformation services.

In his role, Dowling leads the companys technology direction and is responsible for enabling the delivery of application migration and modernisation projects at scale. He is also involved in building out Sideros microservices, containerisation, DevOps and cloud managed service offerings.

Prior to becoming CTO, Dowling spent more than five years as agile line manager with Sidero, leading and managing service delivery from four teams and a number of individual consultants to some of the companys key clients.

Before joining Sidero, Dowling oversaw unique research and innovation programmes at the Georgia Tech Research Institute. Prior to that, he spent 15 years working with Nokia in its London and San Diego bases, where he held positions across multiple business units as a systems engineer and consultant.

We are practising what we preach to our customers and aggressively adopting digital transformation internally JOE DOWLING

In response to demand, we are currently rolling out a cloud managed service for clients who have gone through recent cloud migrations and or re-hosting or re-platforming. We are also continuing to build upon our multi-cloud computing skills for the three major hyperscalers: AWS, Azure and Google Cloud Platform.

Our team at Sidero is 150 strong, the majority of which are software developers, consultants and architects, all of which are onshore. Sidero provides customers with multiple teams of onshore developers, product owners, cloud architects and scrum masters to help deliver on long-term digital programmes.

Our entire organisation is agile; we can scale up to 50 of the best people at short notice and scale down when needed.

A core pillar of our business is helping our customers on their digital transformation journey. This involves the development of greenfield applications which are built from the ground up to be cloud native, the migration of legacy applications from on-premise servers to the cloud, and architecting or provisioning of cloud infrastructure which acts as cloud landing zones for organisations. Sidero is focused on enabling customers to change faster than their competitors.

We are also practising what we preach to our customers and aggressively adopting digital transformation internally in our own organisation.

Multi-cloud strategies are something that we are increasingly seeing. Clients see some risk in vendor lock-in to a single cloud service provider (CSP) and want to bring in other providers to avoid lock-in and increase competition.

The other major trend is remote working, digital collaboration and ways of working which have fundamentally changed our industry since the start of the pandemic.

Productivity has not been adversely affected by 100pc remote working, however it is still an open question about how long-term work-from-home models will alter the working culture in IT companies.

Digital transformations which involve a shift to cloud computing services have, in my opinion, inherently resulted in an improvement in most organisations security postures. Very few companies can compete with the security teams of the large hyperscaler CSPs, and it is therefore highly advantageous for them to entrust their security to these external teams.

While moving to the cloud brings its own set of security challenges, such as the fact that cloud solutions are inherently more networked, open and shared, the overall security coverage is improved compared to what smaller organisations can accomplish with limited skills and resources.

The cloud results in a shared responsibility model for security between the CSP and the cloud customer. The CSP provides a very secure global infrastructure, however, the organisation still owns and controls the data and how it gets protected and encrypted.

Dont miss out on the knowledge you need to succeed. Sign up for theDaily Brief, Silicon Republics digest of need-to-know sci-tech news.

See the article here:
Sidero CTO: Why multi-cloud strategies are on the rise - Siliconrepublic.com

Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software – Business Insider

Amazon Web Services is considered the market leader in cloud computing because of its dominance in the infrastructure space, such as computing power and storage services that enable other applications.

But it still lags behind its biggest competitors, like Microsoft, Salesforce, and Oracle, in one major piece of cloud computing: business applications, more broadly called software as a service, or SaaS.

In a recent survey of this sector bySynergy Research Group, five companies Microsoft, Salesforce, Adobe, Oracle, and SAP accounted for over 50% of the market. AWS, meanwhile, failed to crack the top 20.

"For SaaS, AWS is more of a channel to market for software vendors rather than a SaaS provider in its own right," John Dinsdale, Synergy's chief analyst and research director, told Insider.

For AWS, it's a big market to miss out on. The market for business applications, including everything from Microsoft Office 365 and Salesforce sales and marketing software to Zoom's videoconferencing app, is forecast to be the largest segment among all cloud services, reaching $145.4 billion in 2022,according to Gartner.

Amazon is aware of this. For years, the company has tried to build and grow its own applications business, across email, word processing, and video conferencing, to name a few. But those efforts have so far failed to gain traction, both internally and externally, as Insider previously reported.

To solve this, Amazon recently discussed the idea of acquiring a more high-profile software company to make a splash. Among the list of companies discussed was HubSpot, the $40 billion marketing software maker, as Insider previously reported.

"We have several applications that are very large successes," Amazon's representative wrote in a statement to Insider, highlighting Amazon WorkSpaces and Amazon AppStream, which support tens of thousands of active customers. "Others are earlier in their journey, but we continue to believe they have meaningful potential."

Do you work at Amazon? Contact the reporter Eugene Kim via the encrypted messaging apps Signal or Telegram (+1-650-942-3061) or email (ekim@insider.com). Reach out using a nonwork device.Check out Insider's source guidefor other tips on sharing information securely.

Here is the original post:
Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software - Business Insider

Industrial Cyber Security Market: High Investment in Infrastructure as a Service and Cloud Computing Tools to Augment Growth During Coronavirus -…

Pune, India, Dec. 01, 2021 (GLOBE NEWSWIRE) -- The global Industrial Cyber Security Market size is excepted reach to reach USD 29.41 billion by 2027, exhibiting a CAGR of 8.2% during the forecast period. The integration of cybersecurity solutions and advanced cloud services by various industries will spur opportunities for the global market during the forecast period, states Fortune Business Insights, in a report, titled Industrial Cyber Security (ICS) Market Size, Share & COVID-19 Impact Analysis, By Component (Product, Software and Services), By Security Type (Network Security, Cloud Application Security, End-point Security, Internet Security, and Others), By Industry (Process Industry and Discrete Industry) and Regional Forecasts, 2020-2027. The market size stood at USD 15.84 billion in 2019.

Request to Sample PDF Brochure:https://www.fortunebusinessinsights.com/enquiry/request-sample-pdf/industrial-cybersecurity-market-104557

The emergence of COVID-19 has brought the world to a standstill. We understand that this health crisis has brought an unprecedented impact on businesses across industries. However, this too, shall pass. Rising support from governments and several companies can help in the fight against this highly contagious disease. There are some industries that are struggling, and some are thriving. Overall, almost every sector is anticipated to be impacted by the pandemic.

The Report Lists the Key Companies in the Market:

We are making continuous efforts to help your business sustain and grow during COVID-19 pandemics. Based on our experience and expertise, we will offer you an impact analysis of coronavirus outbreaks across industries to help you prepare for the future.

Ask for Customization: https://www.fortunebusinessinsights.com/enquiry/customization/industrial-cybersecurity-market-104557

The report on industrial cyber security incorporates essential understandings of the market, all-inclusive data about prominent players, distinguished facts and figures, latest developments, key drivers and restraints, along with imperative information about dominant regions. Moreover, the report also provides a brief study regarding the impact of the COVID-19 pandemic impact on the industry.

Increasing Acceptance of AI-based Industrial Robots to Bolster Growth

The growing implementation of cloud-based ICS-as-a-service and industrial robots across manufacturing and industrial plants will contribute positively to the markets growth. According to the International Federation of Robotics, in 2018, there were around 125.6 thousand industry robots deployed across the automotive industry, 105.2 thousand deployed across the electronic industry, and 43.6 thousand deployed across the metal and mining industry worldwide. Similarly, as per the Robotic Industries Association (RIA) report, in 2018, around 422,000 industry robots shipped globally. Cybersecurity solutions secure industrial robots from cyber-attacks, thus supporting smooth operations. Moreover, governments heavy investments in cybersecurity will foster the market's healthy growth in the forthcoming years. For instance, in May 2017, the Singaporean government declared an investment for four years (2017 2021) of around USD 1.76 billion in economic strategies. This investment includes the advancement of various Cybersecurity Agency (CSA) of Singapore.

Investment Plans of Prominent Companies to Uplift Market Amid Coronavirus

The coronavirus has adversely affected the IT sector around the world, consequently hampering the market. However, noteworthy companies are focused on investment strategies to improve the market scenario. According to IDC, worldwide IT spending is expected to decline by 2.7% due to COVID-19. Moreover, the expenditure on infrastructure as a service (IaaS) and cloud computing tools is projected to increase in the near future. For instance, in May 2020, Rockwell Automation, Inc., announced that it has acquired Kalypso, LP., software delivery and consulting organization. The company intends to provide control products and solutions using Kalypsos abilities to develop security solutions. Moreover, the temporary closure of manufacturing facilities, industrial plants, factories, and other industries has restricted the market's expansion.

Quick Buy Industrial Cybersecurity Market Research Report:https://www.fortunebusinessinsights.com/checkout-page/104557

Implementation of Cloud-Based Security Solutions to Boost Growth in the Asia Pacific

The market Asia Pacific is expected to rise excellently during the forecast period due to existing companies in China, India, Taiwan, Japan, Australia, South Korea, and other ASEAN countries. The heavy investments in cloud-based security applications will contribute positively to the growth of the market in Asia Pacific. The emergence of new companies coupled with small and medium enterprises (SMEs) will foster the healthy development of the market in Asia Pacific. Europe is expected to expand radically during the forecast period owing to the rising investment for secure IT infrastructure across industries. For instance, according to UBS Group AG, in Europe, the estimated electric vehicle revenue is likely to reach around 6.33 million units by 2025.

Key Development:

August 2019: Cisco System Inc., an American multinational technology conglomerate headquartered in San Jose, California, completed the acquisition of Sentryo, a Lyon, France-based company. Sentryo offers cybersecurity solutions and asset visibility for industrial control systems (ICS).

Speak to Analyst:https://www.fortunebusinessinsights.com/enquiry/speak-to-analyst/industrial-cybersecurity-market-104557

Have a Look at Related Research Insights:

Access Control Market Size, Share & COVID-19 Impact Analysis, By Component (Hardware, Software, and Services), By Type (DAC, MAC, RBAC), By Application (Homeland Security, Commercial, Residential, and Industrial), and Regional Forecast, 2020-2027

Chatbot Market Size, Share & COVID-19 Impact Analysis, By Component (Platform/Software Development Kit and Services), By Deployment (Cloud and On-premises), By Application (Website, Contact Centers, Social Media and Mobile Application), By Industry (Banking, Financial Services and Insurance (BFSI), Retail and ecommerce, Information Technology (IT) and Telecom, Media and Entertainment, Healthcare and Others and Regional Forecast, 2020-2027

Speech and Voice Recognition Market Size, Share & Industry Analysis, By Component (Solution, Services), By Technology (Voice Recognition, Speech Recognition), By Deployment (On-Premises, Cloud), By End-User (Healthcare, IT and Telecommunications, Automotive, BFSI, Government, Legal, Retail, Travel and Hospitality and Others) and Regional Forecast, 2019 2026

Facial Recognition Market Size, Share & Covid-19 Impact Analysis, By Component (Solutions, Services), By Technology (2D Facial Recognition, 3D Facial Recognition, Thermal Face Recognition, Skin Texture Analysis, and Others, By Application (Face Identification, Access Control, Security & Surveillance, and Others, By End-user (BFSI, Healthcare, Government & Defense, IT & Telecom, Retail & ecommerce), and Regional Forecast, 2020-2027

Cyber Security Market Size, Share & COVID-19 Impact Analysis, By Component (Solution and Services), By Deployment Type (Cloud and On-Premise), By Enterprise Size (Small & Medium Enterprise and Large Enterprise), By Industry (BFSI, IT and Telecommunications, Retail, Healthcare, Government, Manufacturing, Travel and Transportation, Energy and Utilities and Others) and Regional Forecast, 2021-2028

About Us:

Fortune Business Insights delivers accurate data and innovative corporate analysis, helping organizations of all sizes make appropriate decisions. We tailor novel solutions for our clients, assisting them to address various challenges distinct to their businesses. Our aim is to empower them with holistic market intelligence, providing a granular overview of the market they are operating in.

Contact Us:

Fortune Business Insights Pvt. Ltd.

308, Supreme Headquarters,

Survey No. 36, Baner,

Pune-Bangalore Highway,

Pune - 411045, Maharashtra, India.

Phone:

US :+1 424 253 0390

UK : +44 2071 939123

APAC : +91 744 740 1245

Email: sales@fortunebusinessinsights.com

LinkedIn: https://www.linkedin.com/company/fortune-business-insights

Facebook: https://www.facebook.com/FortuneBusinessInsightsPvtLtd

Read Press Release: https://www.fortunebusinessinsights.com/press-release/global-industrial-cyber-security-market-10414

Visit link:
Industrial Cyber Security Market: High Investment in Infrastructure as a Service and Cloud Computing Tools to Augment Growth During Coronavirus -...

Everyone’s been talking about AWS, and Google Cloud is jealous – Techradar

Just as the curtain falls on Amazon Web Services' re:Invent 2021 event, Google Cloud has announced a series of new cloud regions, not just in the US, but around the world.

With 29 cloud regions and 88 zones already operational, Google claims that it already runs more regions with multiple availability zones than any other hyperscale cloud provider.

So far in 2021, the company says it has opened new regions in Warsaw (Poland), Delhi NCR (India), Melbourne (Australia) and Toronto (Canada). Next year, meanwhile, Google Cloud will build new cloud regions in Columbus, Ohio, Dallas, Texas, as well as in Israel, Germany, and Saudi Arabia.

Reporting on the development, ZDNet asserts that Googles cloud computing subsidiary isnt yet profitable and trails behind both AWS and Microsoft Azure, despite soaring quarterly revenues.

Google, on the other hand, claims its more concerned about other things:

As we add regions across the Americas, Asia, Europe and the Middle East, Google Cloud is committed to continuing to help build a more sustainable future and create opportunities for everyone, the company said.

As it shares the details of its new upcoming regions, Google says it takes pride in the fact that it runs the cleanest cloud in the industry, pointing to its recently expanded portfolio of carbon-free solutions, and new initiatives designed to help its customers do their bit to save the environment.

Original post:
Everyone's been talking about AWS, and Google Cloud is jealous - Techradar

Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External…

Paper offers recommendations for choosing, planning, and deploying cloud-native key management systems when organizations want to or must import key material

SEATTLE, December 02, 2021--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the worlds leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.

"A cloud service providers KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customers on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organizations assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the papers authors. "Its our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."

The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isnt a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.

Story continues

For further reading, Key Management in Cloud Services: Understanding Encryptions Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.

The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.

Download Cloud Key Management System with External Origin Key now.

About Cloud Security Alliance

The Cloud Security Alliance (CSA) is the worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud from providers and customers to governments, entrepreneurs, and the assurance industry and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

View source version on businesswire.com: https://www.businesswire.com/news/home/20211202005230/en/

Contacts

Media Contacts Kristina Rundquist for the CSAkristina@zagcommunications.com

Read more from the original source:
Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External...

Running business on Cloud – The Hindu

From SaaS to IaaS to PaaS, the application of cloud computing has now become universal

If you want to sell something, the most important thing to focus on is the business model. And if you want to sell your products or services online, then you need a web portal that supports a business process that goes from taking the request,delivering the product and collecting the payment. Twenty years ago one would have to set up a technical team to manage all the computer infrastructure. However, that is no longer the case.

With Cloud Computing, you only have to subscribe to a service provider to obtain the hardware and operating system that your software needs. This lets you focus on the core business problem and not worry about computer infrastructure which will reside in a datacentre in your country or somewhere else. And the pricing for this mix of hardware product and service is based on how long the computers are used, the type of hardware and how much data is stored etc.. In other words, Cloud Computing brings the utility model to computer infrastructure: like electricity, we only pay for how much we use. Cloud computing business had a valuation of $370 billion in 2020 and it reflects how critically important Cloud Computing is to any business that uses software. Almost 50% of all corporate data is stored in the Cloud.

At the heart of Cloud computing are two vital technologies: virtualisation which lets computer resources be shared through multiple virtual machines; and network that lets data requests flow to and from the datacentre or the Cloud through the Internet. It needs to be noted that resource sharing and utility computing have existed in some form for many years. A good example is the IBM mainframe which accepted job requests and allocated computing resources. But the difference with Cloud computing is that hardware resources are distributed across multiple locations and there is a diverse choice of software that is available to consumers. Mainframes typically were high power computers but Cloud computing offers more computing power with commodity hardware and more choice of software pre-installed as per our demand.

This model of utility computing is called pay-as-you-go and it is the same principle behind Software as a Service (SaaS). With SaaS, a software user is charged based on how many transactions a customer makes and the volume of those transactions, instead of a flat fee. An example is Google Photos where a customer pays based on the giga-bytes that is required to store photos. Other popular examples are Zoho applications and Google Applications. SaaS model is now present in various complex businesses. Even Cloud Computing services like Amazon Web Services or Microsoft Azure, work on the principle of SaaS but because they offer Infrastructure, they are Infrastructure as a Service (IaaS) if we order hardware with minimal software, or Platform as a Service (PaaS) if we order hardware with more than minimal software installed on it.

When software is built and run on the Cloud, depending on where the servers (ie, the computer infrastructure) are located, the response time will differ. To provide quick responses especially when customers are present in multiple geographies (think Google or Amazon or IRCTC), it is prudent to host the Cloud in multiple locations. This is called Edge computing. By Cloud we refer to the same datacentre and network circuits that are used by multiple customers including possibly our business competitors. It is also called public Cloud. In contrast to this is the private Cloud where geographically distributed hardware are cordoned off virtually such that the computing resources are allotted only to one customer. A recent trend is to manage data security issues by using hybrid Cloud: the extremely vital, private information is stored in the private Cloud while the less critical data is stored in the public Cloud.

Cloud Computing unleashes unlimited computing resources and to use these resources to the fullest, new software development paradigms need to be adopted. For example, the recent trend known as Cloud native development is developing software that runs on multiple parallel threads or can automatically request for extra servers when demand is high and turn off servers when demand is low.

In order to automate launching new servers, managing them, running software in them, scaling them down etc. automation software like Terraform is used. These are called Infrastructure-as-a-service software. There are many solutions built around infrastructure failing over to a back-up, spawn new virtual machines called containers and ensure High Availability etc.. These solutions all come under the umbrella called Devops (Development and Operations).

When Cloud Computings potential is used well, one can launch rich features faster and put customers on cloud nine.

See the original post here:
Running business on Cloud - The Hindu