Security News > 2020 > April > Week in review: Cloud migration and cybersecurity, data trending on the dark web, Zoom security

What type of data is trending on the dark web?Fraud guides accounted for nearly half of the data being sold on the dark web, followed by personal data at 15.6%, according to Terbium Labs.
Will Zoom manage to retain security-conscious customers?While Zoom Video Communications is trying to change the public's rightful perception that, at least until a few weeks ago, Zoom security and privacy were low on their list of priorities, some users are already abandoning the ship.
On my mind: Transitioning to third-party cloud servicesThe transition from traditional onsite data colocation to the use of third-party cloud shared tenant services should be on everyone's minds.
Information security goes non-binaryFinding security holes in information systems is as old as the first commercially available computer.
Shift to work-from-home: Most IT pros worried about cloud securityAs most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining the security of their cloud environments during the transition, according to a survey conducted by Fugue.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/M-6ZVv8Ase4/
Related news
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- Why multi-cloud security needs a fresh approach to stay resilient (source)
- Cloud security gains overshadowed by soaring storage fees (source)
- Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security (source)
- Google to purchase Wiz for $32 billion in cloud security play (source)
- Cloud providers aren’t delivering on security promises (source)
- Spring clean your security data: The case for cybersecurity data hygiene (source)
- There are 10,000 reasons to doubt Oracle Cloud's security breach denial (source)
- How does your data end up on the dark web? (source)