Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » cloud migration

Articles Tagged with ''cloud migration''

Lightbulb with gradient colorful background

Ensuring security and compliance in evolving cloud environments

Howerton headshot
Travis Howerton
September 24, 2024

With the rapid pace of cloud adoption, organizations are revolutionizing operations but are having a harder time ensuring that systems are deployed with the proper cyber hygiene.


Read More
Half open laptop in blue

Closing the cloud skills gap as adoption grows

Karl Fosaaen Headshot
Karl Fosaaen
June 21, 2024

As cloud use continues to grow, training and scaling teams to protect a modern cloud environment will pay off exponentially. 


Read More
Multicolor digital spiral

Data protection top motivator for cloud-based backup

Security Staff
May 21, 2024

A recent report found that the top drivers for cloud-based backup are the desire to integrate cyber technologies with data protection and backup.


Read More
Video cameras on wall with people looking at them

Hybrid-cloud: The best of both worlds

Laurent Villeneuve
April 19, 2024

No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central head end. 


Read More
Golden lock and credit cards on keyboard

67% of businesses sync on-premises passwords to cloud environments

Security Staff
March 26, 2024

New research provides key insights and classifications regarding the threats that identity security teams face. 


Read More
Black screen with colorful text

47% of cloud storage billing is allocated to data and usage fees

Security Staff
February 28, 2024

Cloud storage was analyzed in a recent report finding that 93% of organizations plan to grow their public cloud storage capacity in 2024.


Read More
Intercom on wood paneling

Five reasons a building needs a peer-to-peer based IP intercom system

John Hemp
February 23, 2024

Intercom systems can provide a facility with a significant amount of security and control, enabling users to communicate with other individuals.


Read More
multicolor text on black screen

62% of IT and security teams are remediating exposures

Security Staff
January 9, 2024

According to a recent report, 87% of organizations indicate plans to enhance vulnerability and exposure remediation efforts within the next year.


Read More
vertical rows of green numbers

AI-driven cyber threats require SaaS data protection

Simon Taylor
January 5, 2024

The cybersecurity landscape is already a battleground of cyberattacks, with the proliferation of SaaS applications adding to its complexity.


Read More
orange and green wires in panel

Over 25% of organizations' physical security setups are in the cloud

Security Staff
November 29, 2023

According to a recent physical security report, 44% of security leaders have more than 25% of their physical security setups are in the cloud.


Read More
Previous 1 2 3 4 5 6 7 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing