Security failing to keep pace with cloud technology adoption, report finds

(c)iStock.com/Melpopenem

Cloud service providers (CSPs) can no longer treat security as a luxurious add-on, and customers have to ensure their providers take care of the issue, a new report asserts.

The research, the latest cab off the rank from Ovum and FireHost entitled “The Role of Security in Cloud Adoption within the Enterprise”, offers sound advice to vendors and users alike. True, it’s stuff everyone will have heard before – but it’s worth repeating.

“On too many...

By James Bourne, 09 April 2015, 0 comments. Categories: Compliance, Research, Security, Vendors.

Compliance remains the key cloud security challenge, according to CipherCloud report

(c)iStock.com/magann

Almost two thirds of organisations in a CipherCloud survey on cloud data protection say compliance and auditing privacy is the biggest security challenge associated with cloud computing.

CipherCloud, which has released its inaugural “Global Cloud Data Security Report”, found a number of interesting findings in the research, and the challenges associated with data security for Global 2000 companies.

Compliance and data protection concerns continue to remain the top barriers for...

By James Bourne, 26 March 2015, 1 comment. Categories: Compliance, Data & Analytics, Data Management, Data Sovereignty, Security.

Campaign for Clear Licensing pens open letter to Oracle after report slamming software practices

(c)iStock.com/maybefalse

Updated The Campaign for Clear Licensing (CCL), a not-for-profit organisation advocating clear software practices, has written an open letter to Oracle urging the tech giant to address concerns over vendor lock-in to ensure users migrate to its cloud products.

The group released a report in November slamming Oracle for having an “arms length, impoverished...

By James Bourne, 06 January 2015, 0 comments. Categories: Compliance, Privacy, Software.

KPMG survey shows how cloud “continues to drive disruption in the business world”

(c)iStock.com/mihtiander

Almost half of respondents in KPMG’s 2014 cloud computing survey are using cloud to drive cost efficiencies, with a similar number utilising it to better enable their mobile workforce.

The study, of 500 global C-suite executives, saw a variety of ways in which businesses are using cloud to drive business transformation. Aside from cost savings (49%) and enabling a mobile workforce (42%), CXOs also see the benefit of cloud as improving alignment with customers and partners (37%),...

By James Bourne, 02 January 2015, 1 comment. Categories: Adoption, Compliance, Privacy, Security, Vulnerabilities.

China to assess trustworthiness of cloud providers

©iStock.com/123ArtistImages

Cloud computing providers in China are to be assessed for their trustworthiness according to a report – which could mean bad news for foreign CSPs.

According to a report from China Daily, the new government system will be similar to the FedRAMP accreditation used in the US. Only firms who pass this ruling in full will be allowed to take part in government projects, according to Zuo Xiaodong, vice president of the...

By James Bourne, 23 December 2014, 0 comments. Categories: Compliance, Privacy.

Cloud best practices: Compliance, campaigns and SLAs

Picture credit: iStockPhoto

The cloud computing track at Apps World Europe yesterday threw up a series of interesting case studies, opinions and analysis.

John Finch, CIO of the Bank of England, spoke in the keynote session and revealed the bank’s use of cloud technologies only extended to the public-facing front end; John Pillar, CTO of Discover & Deliver spoke of a huge cloud-based IT project at former employer Marks & Spencer, and a morning panel session examined SLAs and mobile cloud best...

By James Bourne, 13 November 2014, 0 comments. Categories: Best Practice, Case Studies, Compliance, SLA.

7 reasons why cloud governance is a challenge: Should we eradicate shadow IT?

Picture credit: iStockPhoto

Another day, another report bemoaning shadow IT for cloud computing. SafeNet’s Challenges of Cloud Information Governance study, conducted by the Ponemon Institute, is the latest to put the blame of compromising data at the door of unapproved IT activity.

Shadow IT, which involves employees bypassing company policy on website and technology usage, has meant cloud security is “stormy”, according to the report. More than half (55%) of the 1,864 IT and IT security...

By James Bourne, 04 November 2014, 0 comments. Categories: Compliance, Data Management, Data Sovereignty, Enterprise, Privacy.

Report slams Oracle’s relationship with customers for software licensing

Picture credit: iStockPhoto

A report from the Campaign for Clear Licensing (CCL) has found that the majority of Oracle licensees have an “arms length, impoverished relationship” with the software giant.

The report found an alarming number of complaints, the majority of which resulting from poor communication between seller and client. 92% of those polled argued Oracle does not clearly communicate licensing changes, while 88% disagreed that Oracle audit requests were clear and easy to...

By James Bourne, 03 November 2014, 0 comments. Categories: Compliance, Privacy, Research, Software, Vendors.

4chan user reportedly hacks iCloud with nude celeb pics – as Google strengthens security

An anonymous hacker on the 4chan site has published a series of naked photos of more than 100 celebrities, including Jennifer Lawrence, Kate Upton and Mary Elizabeth Winstead, after reportedly hacking into the users’ iCloud accounts.

Even though the photos appeared to originate from iCloud devices – and even though 4chan users mentioned it – it’s not been confirmed that Apple’s cloud storage system provided the leak. Other theories are being banded about as to how the photos were...

By James Bourne, 01 September 2014, 3 comments. Categories: Compliance, Security.

Community health systems, HIPAA, and cloud hosting: The facts

On the heels of the recent Community Health Systems (CHS)  data breach, in which 4.5 million Personal Health Records (PHI) were compromised, the industry is abuzz about data security in the HIPAA Compliant cloud businesses.  Data breaches like the one at CHS are not the exception – they’re the norm.  The FBI warned that the healthcare industry is extremely vulnerable to hackers in a recent

By Logicworks, 21 August 2014, 0 comments. Categories: Compliance, Security.