Hong Kong overtakes Japan as most mature Asia Pacific cloud nation

(c)iStock.com/luxizeng

Hong Kong is the most ‘cloud-ready’ Asia Pacific nation with an overall ranking higher than that of the US and UK, according to the latest analysis from the Asia Cloud Computing Association (ACCA).

Japan, previously the leader, moved down four places to #5 in the chart with an overall score of 73.0 compared to Hong Kong’s 78.1, with the latter scoring top markets in broadband quality, privacy, and data centre risk. Singapore (76.7), New Zealand (74.4) and Australia...

By James Bourne, 28 April 2016, 1 comment. Categories: Data & Analytics, Data Management, Infrastructure, Privacy, Security.

Businesses suffering from lack of knowledge over GDPR, report finds

(c)iStock.com/BrianAJackson

The updated EU General Data Protection Regulation (GDPR) legislation is coming in the next two years – but businesses are at risk of fines because of gaps in knowledge, according to new research from Trend Micro.

More than a quarter (26%) of companies don’t know how much time they have to become compliant, according to the report which surveyed 100 senior IT decision makers in the UK. Almost one in five (18%) are not currently aware that they face fines, while a third...

By James Bourne, 26 April 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

The top five in-demand cloud security skills for 2016

(c)iStock.com/Jirsak

The cloud computing market continues to expand at a phenomenal rate. According to a recent report from IDC, worldwide spending on public cloud services will grow 19.4% annually through to 2019. Six times the rate of overall IT spend growth, this will double the current spend from $70 billion to $141 billion.

As more businesses transition to the cloud this will drive up demand for IT professionals with the skills to make the most of the technology. A market, which...

By Ed Jones, 20 April 2016, 0 comments. Categories: Compliance, Security, Vulnerabilities.

The key to maximising the advantages of cloud security

(c)iStock.com/LeoWolfert

By Paul Fletcher, Security Evangelist at Alert Logic

Despite the pervasive use of the cloud to handle complex, secure workloads, many organisations question whether the cloud is natively secure. They still think that the security of a system depends on their ability to touch and control a physical device. Visibility from layer one (physical) up to layer seven (application) of the OSI Model gives us security professionals a good gut feeling.

Veteran systems administrators are challenged to both...

By Logicworks, 14 April 2016, 0 comments. Categories: Infrastructure, Security.

Organisations start to address the subtleties of securing 'as a service' propositions

(c)iStock.com/BlackJack3D

According to a recent Verizon report, 94% of companies expect more than a quarter of their workloads to be in the cloud within two years. The enterprise is moving to a cloud model of IT service consumption and delivery for a variety of reasons: IT organisations can become more responsive to business requirements by scaling up on demand, operations are refocused toward the...

By Jeff Denworth, 01 April 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.

Data resilience: Why CEOs and CFOs need to understand the CIO agenda

(c)iStock.com/Akindo

The CIO agenda changes each year, albeit not drastically. In 2015 part of their focus was on hybrid cloud spending, but this year research and analyst firm Gartner says that it’s now about how they enhance the power of digital platforms. The company’s ‘Building the Digital Platform: Insights From the 2016 Gartner CIO Agenda Report’ says: “As digitalisation moves from an...

By Graham Jarvis, 31 March 2016, 0 comments. Categories: CIO, Data & Analytics, Data Management, Security.

Analysing security and regulatory concerns with cloud app migration

(c)iStock.com/baluzek

As businesses look to clouds for faster, more flexible growth, they confront significant challenges from a legacy application base that has varying levels of cloud suitability. It is therefore worth examining how security and compliance requirements can impact choice of cloud or architecture strategies within a cloud. 

Maintaining privacy for data that must be protected for business or regulatory reasons is a substantial concern in cloud migration, public or private. Security and...

By Bryan Solie, 11 March 2016, 0 comments. Categories: Applications, Compliance, Data & Analytics, Data Management, Security.

A warning shot: Why cloud security remains more important than ever

(c)iStock.com/LeoWolfert

With all the recent well-publicised hacking and malware attacks, not to mention numerous meteorological events that have affected companies around the globe over the last year, IT leaders are very aware of the need for robust cloud security and compliance.

That said it is infact now easier for companies to engage in poor security practices because users do not have the same control over their cloud infrastructure that they have over their own on-premise infrastructure. Often,...

By Monica Brink, 10 March 2016, 0 comments. Categories: Applications, Infrastructure, Security.

The cloud is becoming more secure – but it’s still costly to keep it that way

(c)iStock.com/RyanKing999

Fears over cloud security will continue to linger, but the situation is improving: almost two thirds (64%) of enterprises polled by analyst house Clutch argue cloud infrastructure is more secure than legacy systems.

36% of the 300 respondents polled said cloud was much more secure than legacy infrastructure, compared to 28% who argued it was “somewhat” more secure. Only 11% of respondents argued cloud was in any way less secure, with 1% saying it was ‘much...

By James Bourne, 04 March 2016, 0 comments. Categories: Infrastructure, Research, Security.

MWC takeaways: Making sure your infrastructure is secure for the connected world

(c)iStock.com/Maciej Noskowski

With Mobile World Congress over for another year, I’ve now had a chance to digest everything that was on show last week. This conference, which is arguably the planet’s best venue for mobile industry networking, looked at the Internet of Things and the connected world, anything and everything from developments such as 5G to newly connected toothbrush devices that ensure consumers brush their teeth as the dentist intended.

What all these new technology innovations...

By Monica Brink, 02 March 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.