Welcome to this week’s edition of CloudBolt’s Weekly CloudNews!
Here are the blogs we’ve posted this week:
- CloudBolt Quick Tips: Approvals
- Microsoft Azure Shared Image Gallery in CloudBolt 9.4.1
- AWS Integration – Why Enterprises Should Tap into the Unbelievable Power of AWS
- Cloud Security Compliance Can Help Prepare for Cloud Risks
With that, onto this week’s news:
Matt Asay, InfoWorld, Oct. 5, 2020
“Multicloud is definitely a thing. However, it’s not exactly clear what that ‘thing’ is. According to new survey data from database vendor MariaDB, 71% of survey respondents report running databases on at least two different cloud providers today. Yet when asked what would keep them from going all in on a cloud database, a vendor’s “lack of a multicloud offering” ranked dead last. In other words, everyone is doing multicloud, but no one knows why.
Which perhaps supports Gartner analyst Lydia Leong’s contention that, ‘Most organizations end up multicloud, rather than intending to be multicloud in a deliberate and structured way.’ Pragmatism, not dogmatism, rules.”
David Linthicum, InfoWorld, Oct. 2, 2020
“Do you have an optimized architecture? This means that your solution maximizes efficiency and minimizes costs. You’ve selected the right cloud resources to configure the best storage systems, databases, and compute platforms—at least that’s what you think.
What I’m seeing out there, over and over again, is the selection of the wrong cloud resources for the wrong reasons. Cloud providers are pushing something that maximizes their revenue rather than being right for you.”
Matt Powell, CPO Magazine, Oct. 2, 2020
“Cyber attacks have increased in frequency. While all industries and all sizes of businesses are vulnerable, these attacks have centered on government agencies, centers of education, health agencies, and banking institutions. One reason data breaches are on the rise is because businesses are migrating their data storage from local storage to the cloud. Cloud storage is connected via wired and wireless technologies.
Cloud storage is convenient. It makes it possible to store large databases of important information. Unfortunately, hackers have become adept at exploiting weaknesses in cloud storage and cloud computing. They can get unauthorized access and then use the information they garner to blackmail individuals, engage in identity theft, or sell the information to a third party.”