WELCOME TO The cloud REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Lightspin | April 06, 2022
Lightspin, the next-generation cloud security platform, today announced the first free AWS cloud security tool that scans any and all domains to reveal publicly exposed cloud assets.Recon.Cloud is a free AWS cloud threat intelligence resource that provides a clear view of any domain's current exposure from an attacker's perspective. Users will have vastly greater visibility into and increased transparency of their publicly exposed assets.
Attack surface management is a ris...
CLOUD APP DEVELOPMENT
Oracle | July 18, 2022
Oracle and Claro announced a partnership to jointly offer Oracle Cloud Infrastructure (OCI) services to public and private sector organizations and enterprises in Colombia. Claro will become the host partner for an Oracle Cloud region in Colombia, which will enable Claro to offer OCI platform services along with professional and managed services to help customers adopt cloud solutions. In addition, to help improve its customer service and billings processes, Claro will migrate over 100 on-premis...
Qumulo, HPE GreenLake Cloud Services | June 18, 2021
Qumulo, a leader in radically simplifying enterprise file data management across hybrid cloud environments, announced an integration with HPE GreenLake Cloud Services to offer customers the Qumulo File Data Platform delivered as a service. This collaboration provides an advanced cloud experience with on-premises control to meet today’s unstructured data demands across industries. This news comes following Qumulo’s expansion of its global operations to Asia-Pacific and its strategic p...
Orca Security | September 14, 2022
Orca Security, the cloud security innovation leader, today released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most critical security gaps are found. One of the report’s key findings is that the average attack path is only 3 steps away from a crown jewel asset*, which means an attacker only needs to find three connected and exploitable weaknesses in a cloud environment to exfiltrate dat...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE