Preparing for a year of ‘unknown unknowns’ in cyber security

(c)iStock.com/tonefotografia

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s going away in 2017. In fact, we’re starting to see continued and varied threats, most...

By Mike East, 07 December 2016, 0 comments. Categories: Security, Vulnerabilities.

How software asset management needs to adapt to changing cloud conditions

(c)iStock.com/whiteson

A new report issued today by Flexera Software argues that software asset management (SAM) needs to evolve to keep up with software as a service (SaaS) and virtualisation moving into the mainstream.

The study, which polled almost 500 respondents answering questions on enterprise and application production, found that for 20% of respondents, more than a quarter of their software is SaaS-based, while 39% say more than a quarter is virtualised. Interestingly, while three quarters say 80% or...

By James Bourne, 06 December 2016, 0 comments. Categories: Research, Security, Software, Vulnerabilities.

Latest survey data warns SMBs are not using automation for cloud backups

(c)iStock.com/fazon1

Almost 70% of small businesses in a survey from B2B analyst and reviews firm Clutch say they rely on their cloud storage provider for backups, with only 15% opting for automated services and 12% not bothering at all.

The findings appear as the second of two reports on SMBs and cloud strategy, with the first in November advising that many small firms are risking their...

By James Bourne, 02 December 2016, 0 comments. Categories: Data Management, Security, Software, Storage.

The key to defending your data centre against the Internet of Things

(c)iStock.com/4x-image

Opinion The Internet of Things has the potential to revolutionise society once it surmounts its initial growing pains. Unfortunately, one of those involves security.

DDOS attacks are one of the oldest and most enduring things on the web, like that creepy uncle who no one can get rid of at family reunions. And like that uncle, they’re getting progressively worse as time goes on. This past summer saw the largest DDOS attack in history, one so large that it forced content delivery network...

By Tim Mullahy, 01 December 2016, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security, Vulnerabilities.

Protecting against ransomware in the cloud: A guide

(c)iStock.com/Maciej Noskowski 

A recent survey of 500 businesses revealed that nearly half were brought to a standstill by a ransomware attack within the last 12 months. Ransomware is computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to decrypt it or to not publish it.

Recently, there has been...

By Justin Giardina, 29 November 2016, 0 comments. Categories: Data Management, Security, Vulnerabilities.

Forget about the Internet of Things for a minute – and consider the Security of Things

(c)iStock.com/rzoze19

Opinion The Internet of Things (IoT) is well and truly upon us – and will clearly be even more prevalent in the future. Today, IoT is already branching out into commercial networks as well as enterprise applications. Smart devices are becoming more commonplace in our households with everyday appliances now able to communicate with the internet to help our lives to run more smoothly and interconnected devices are now essential tools in our working lives as well. This...

By Monica Brink, 23 November 2016, 0 comments. Categories: Data & Analytics, Security.

Service providers need to join forces to address enterprise IT complexities

(c)iStock.com/Massimo Merlini

A new report from Tata Communications offers a warning for service providers; their solutions do not always meet the expectations of enterprises.

The research, which was conducted by IDC among enterprises and service providers across 32 countries, saw enterprises rank security, cited by 52% of respondents, cloud (43%) and mobility (32%) as their primary technology priorities.

But there may be a gap between what enterprises want and what service providers can give. Enterprises see...

By James Bourne, 17 November 2016, 0 comments. Categories: Enterprise, Infrastructure, Security.

Clutch survey warns about security of small businesses using free cloud storage

(c)iStock.com/Henrik5000

Small businesses continue to put security as their main priority when selecting a cloud storage provider, yet many continue to risk their security by choosing free solutions, according to a new survey from analyst firm Clutch.

According to the survey, which polled almost 300 small and medium businesses who use at least one cloud storage platform, 25% of respondents admit they use a free cloud storage product, compared to 71% who said their organisations pay for cloud storage.

More...

By James Bourne, 16 November 2016, 0 comments. Categories: Research, Security, Software, Storage.

How cloud IAM is driven by the need for secure and robust enterprise governance

(c)iStock.com/ismagilov

The emergence of the Internet has given birth to a number of cloud-based technologies and services to cater to a wide audience. There has been a significant rise in the number of users and enterprises who are adapting to the radical changes cloud technologies have brought about in enterprise handling and management.

The colossal volumes of data and information held by any business organisation run the sheer risk of intrusion from malicious insiders, network threats, hacking attacks,...

By Nitin Chitmalwar, 15 November 2016, 0 comments. Categories: Data & Analytics, Enterprise, Security, Vendors.

Clearing the fog: A vision of security for hybrid clouds

(c)iStock/TARIK KIZILKAYA

Have you ever driven on a high road or mountain pass that’s shrouded by low cloud? You’re at the familiar controls of your vehicle, but you can’t easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. 

Progress can be hazardous unless you take extra precautions. 

The feeling will be familiar to many organisations’ IT teams as they transition some of their business applications and data to the cloud.   

The...

By Donald Meyer, 11 November 2016, 0 comments. Categories: Security.