UK regulator raises concerns, launches cloud competition investigation against Microsoft and Amazon

UK regulators have accused Microsoft and Amazon of unfairly limiting competition in the cloud services market. The preliminary findings from Ofcom’s market study into the sector suggest that these two “hyperscalers” charge significantly higher egress fees than most other providers and set technical restrictions that limit interoperability with other cloud providers. Ofcom also raised concerns […]

Advantages of Cloud Computing for Cybersecurity

As cyberattacks become increasingly sophisticated, companies face severe financial and reputational damage. With the use of artificial intelligence and machine learning, hackers exploit vulnerabilities, making social media scams more challenging to detect. Therefore, cybersecurity has become a key factor when considering a move to the cloud. Cloud ERP providers invest heavily in capabilities to protect […]

Understanding Cybersecurity Risks and Solutions for 5G Network Slicing, according to SecurityGen

According to research by the GSMA, the market for virtual network slicing among businesses is estimated to reach a value of USD$300bn by 2025. However, mobile operators must be aware of the added responsibility they will face regarding cybersecurity if they choose to offer network slicing to their business clients using their 5G networks. SecurityGen’s […]

Capita IT systems disrupted by cyber-attack

Capita, a major outsourcing company with £6.5 billion in public sector contracts, has confirmed that a cyber attack caused IT outages for some of its services on March 31. The attack affected the company’s internal Microsoft 365 applications, resulting in disruptions to some services provided to individual clients. While the majority of the company’s client […]

U.S. organizations targeted by fraudulent ransomware group using hollow data leak warnings

A group of fraudulent extortionists are exploiting data breaches and ransomware attacks to scam US companies. They threaten to sell or publish allegedly stolen data unless payment is made. In some cases, the group has added a distributed denial-of-service (DDoS) attack threat. The group, calling themselves Midnight, impersonates ransomware and data extortion gangs in emails, […]