Security News > 2020 > April > Week in review: Cloud migration and cybersecurity, data trending on the dark web, Zoom security
What type of data is trending on the dark web?Fraud guides accounted for nearly half of the data being sold on the dark web, followed by personal data at 15.6%, according to Terbium Labs.
Will Zoom manage to retain security-conscious customers?While Zoom Video Communications is trying to change the public's rightful perception that, at least until a few weeks ago, Zoom security and privacy were low on their list of priorities, some users are already abandoning the ship.
On my mind: Transitioning to third-party cloud servicesThe transition from traditional onsite data colocation to the use of third-party cloud shared tenant services should be on everyone's minds.
Information security goes non-binaryFinding security holes in information systems is as old as the first commercially available computer.
Shift to work-from-home: Most IT pros worried about cloud securityAs most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining the security of their cloud environments during the transition, according to a survey conducted by Fugue.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/M-6ZVv8Ase4/
Related news
- How AI Is Changing the Cloud Security and Risk Equation (source)
- A closer look at the 2023-2030 Australian Cyber Security Strategy (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Dark web crypto laundering kingpin sentenced to 12.5 years in prison (source)
- Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage (source)
- AI’s impact on the future of web application security (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)
- Here's what happens if you don't layer network security – or remove unused web shells (source)
- Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks (source)