Our most-read articles about cloud computing in 2022 explore hyperscaler service enhancements and how enterprises can better adopt cloud computing in a world of remote work.
Analysts see an uptick in token theft from authenticated users, allowing threat actors to bypass MFA protections.
Researchers find current data protection strategies are failing to get the job done, while a lack of qualified IT talent slows cyber-defense initiatives.