Netskope gives another warning to businesses struggling with GDPR compliance

(c)iStock.com/maxkabakov

An overwhelming 94% of cloud apps in enterprises across EMEA are not enterprise-ready, while two thirds of overall cloud services are not up to scratch, according to the latest research from Netskope.

The findings, which appear in the company’s latest quarterly cloud report, found that 82.4% of services do not encrypt data at rest, 66.4% of cloud services do not specify that the customers owns the data in their terms of services, while 42% do not allow admins to enforce password...

By James Bourne, 12 January 2017, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

‘Security by design’ and adding compliance to automation

(c)iStock.com/maxkabakov

By Jason McKay, CTO and SVP of Engineering, Logicworks

Security is “job zero” for every company. If you are putting your customers or users at risk,  you will not be in business for long. And that begins with taking a more proactive approach to infrastructure security — one that does not rely on the typical protective or reactive third party security tools, but builds security into your infrastructure from the ground...

By Logicworks, 09 January 2017, 1 comment. Categories: Compliance, DevOps, Infrastructure, Security.

The hidden dangers of legacy technology – and how to resolve them

(c)iStock.com/TiSanti

Every business has that one legacy system they can’t seem to let go of. You know you’ve got one - a relic hidden away in some dusty server room. But are you aware of the damage these outdated systems can, will and may already be having on your organisation?

The damage inflicted by legacy technology can range from minor systems issues through to major events that could put your organisation out of business – and it’s important to know the hidden dangers.

Increased downtime...

By Ed Jones, 10 October 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

How Great Western Railway is getting its compliance on the right track

(c)iStock.com/JoeDunckley

Great Western Railway (GWR) has enlisted the help of CoreStream to provide a new system for its compliance and regulations.

Like many organisations, ensuring compliance is vital – but for GWR it may count more than others. The railway operator is governed by a franchise agreement which includes more than a thousand obligations – and failing to comply with them can result not only in fines, but also disqualification from future franchise bids.

As a result, the company...

By James Bourne, 28 September 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Why security and compliance are still the main blockers to cloud adoption

(c)iStock.com/LPETTET

According to the Cloud Industry Forum, 80% of UK companies are adopting cloud technology as a key part of their overall IT and business strategy. However, one of the perceived barriers to cloud adoption continues to be concerns around security and compliance, which was the key topic of discussion at a recent techUK panel in which iland took part. During this discussion, we talked about the fact that nine out of ten security professionals worry about cloud security.

One of the key aspects that...

By Monica Brink, 16 August 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Microsoft secures ISO 27017 security certification around cloud-specific threats

(c)iStock.com/Gajus

Microsoft has announced it has obtained ISO 27017 compliance, a new cloud-based security certification published at the end of last year.

The certification from the ISO, the global organisation which has published more than 21,000 international standards across a variety of industries, is newer and subsequently less known than the ISO 27018 standard, which sets out guidelines to protect personally identifiable information (PII).

Microsoft claimed to be the first adopter of ISO 27018, in

By James Bourne, 04 August 2016, 0 comments. Categories: Compliance, Microsoft, Security.

ISO compliance in the cloud: Why should you care, and what do you need to know?

(c)iStock.com/hh5800

More and more organisations are looking to move to cloud to benefit from scalability, cost reduction and the ability to launch new service offerings fast.

The dynamic nature of cloud however necessitates security and compliance controls that frankly can be daunting. Issues around mobility and multi-tenancy, identity and access management, data protection and incident response and assessment all need to be addressed. And with multiple modes – SaaS, PaaS, IaaS, public, private, hybrid...

By Frank Krieger, 18 July 2016, 1 comment. Categories: Compliance, Data Management, Security.

Egnyte focuses on data governance and reshapes EFSS strategy with Protect release

(c)iStock.com/wavebreakmedia

Enterprise file sync and share (EFSS) firm Egnyte has announced the launch of Egnyte Protect, a product which aims to give IT and line of business greater control and visibility of their content both in the cloud and on-premise.

The move positions Egynte away from the traditional EFSS buckets and moves the firm towards data and information governance, a space Egnyte claims to be worth eight times more than their current opportunity. Isabelle Guis, chief marketing and strategy...

By James Bourne, 07 June 2016, 1 comment. Categories: Compliance, Data & Analytics, Data Management, Enterprise, Software, Storage.

The top five in-demand cloud security skills for 2016

(c)iStock.com/Jirsak

The cloud computing market continues to expand at a phenomenal rate. According to a recent report from IDC, worldwide spending on public cloud services will grow 19.4% annually through to 2019. Six times the rate of overall IT spend growth, this will double the current spend from $70 billion to $141 billion.

As more businesses transition to the cloud this will drive up demand for IT professionals with the skills to make the most of the technology. A market, which...

By Ed Jones, 20 April 2016, 0 comments. Categories: Compliance, Security, Vulnerabilities.