Welcome to this week’s edition of CloudBolt’s Weekly CloudNews!
With that, onto this week’s news:
Macy Bayern, TechRepublic, June 16, 2020
“Cloud usage is surging as a result of the coronavirus pandemic, a Snow Software report found. As more people work remotely and companies reevaluate daily operations, the majority (91%) of IT leaders worldwide said they have been forced to shift their cloud strategies to operate in the new normal.
More than 80% IT leaders said their organizations have increased their overall cloud usage, with 60% saying they believe the increase will continue, and only 22% reportedly feeling the growth has leveled out, the report found.”
Christopher Tozzi, IT Pro Today, June 15, 2020
“Hybrid cloud computing seems to be a less trendy topic these days than it was seven or eight years ago, when hybrid architectures were exploding in popularity. Yet the hybrid cloud ecosystem has changed tremendously in just the past few years–so much so, in fact, that today’s hybrid clouds are fundamentally different from their predecessors. A hybrid cloud created today looks almost nothing like what passed as hybrid cloud for most of the 2010s.
Today, however, true hybrid clouds are becoming much less rare. This is thanks to several new trends and technologies that make it much easier to manage workloads seamlessly across on-premises and cloud-based infrastructure, including multi-cloud, Kubernetes, Azure Stack and AWS Outposts, and more.”
Kevin Townsend, Security Week, June 10, 2020
“Misconfigured cloud databases left exposed to the internet are a huge, but largely unquantified problem. New discoveries are found and reported by security researchers on a weekly basis. What hasn’t been clear is whether bad actors can find them as easily as the researchers. The answer is Yes.
Databases — usually in Elasticsearch or AWS S3 buckets, and often containing sensitive data — are frequently left in public Cloud storage without access controls. The problem is so great that in January 2020, the NSA warned, ‘misconfiguration of cloud resources remains the most prevalent cloud vulnerability.’ Such databases can be accessed, downloaded, or manipulated by anyone who finds them.”