IT skills shortage leading to cybersecurity issues, research argues

(c)iStock.com/maxkabakov

If a security system flags up an issue in your organisation and nobody acts on it, is it even an issue? Many organisations are acting that way, according to a report from Skyhigh Networks and the Cloud Security Alliance (CSA).

The research found that security budgets continue to rise – more than half (53%) of the 220 IT and security professionals polled expect their allocations to go up in the coming year – and the myriad of tools at teams’ disposals is a growing...

By James Bourne, 28 June 2016, 0 comments. Categories: Data Management, Data Sovereignty, Privacy, Security.

Rethinking cyber security: Where does accountability lie?

The many high profile data breaches we have seen splashed across the front pages highlight just how damaging a cyber attack can be on market position, reputation and profits, infiltrating customer data and critical IP. The frequency and success of these attacks also highlights that the existing security strategies of many organisations are dangerously flawed, leaving them wide open to threat, as VMware investigates in this whitepaper downlod.

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise, Security.

The tipping point: Why enterprise security must change

In today's digital world, data is the currency giving businesses the power to act decisively and swiftly, provide rich customer experiences and remain one step ahead of the competition. But as data becomes more valuable, it also becomes more vulnerable.

In this whitepaper, VMware gathered insights from 1,700 IT decision makers and 3,500 office workers from across EMEA and provide 10 important takeaways on the future of enterprise security.

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise, Security.

Ransomware may be a big culprit for data loss – but it’s the wrong fall guy

(c)iStock.com/Big_Ryan

With researchers seeing a 3500% increase in the use of net infrastructure which criminals use to run ransomware campaigns, it’s not surprising that ransomware has been making big headlines.

The media laments the growing rings of cyber criminals that launch ransomware threats, but there’s another culprit that tends to slip under the radar: people like you and me. Sure, we’re not...

By Matt Kingswood, 22 June 2016, 0 comments. Categories: Data Loss, Data Management, Enterprise, Infrastructure, Security.

More than a quarter of enterprise cloud apps deemed risky, CloudLock argues

(c)iStock.com/LeoWolfert

A new piece of research from cloud security provider CloudLock argues that more than a quarter of cloud apps connected to corporate environments were seen as high risk.

The report, the firm’s Q2 2016 Cloud Cybersecurity Report, gave a generally pessimistic warning over the threats of shadow IT. From 2014 to 2016, CloudLock has observed an almost 30 times increase in apps used under shadow IT, from 5,500 to almost 160,000. What’s more, over half of third party apps are...

By James Bourne, 13 June 2016, 0 comments. Categories: Applications, Research, Security.

Netskope study argues majority of cloud apps are not ready for EU GDPR

(c)iStock.com/FrankRamspott

Three quarters of cloud apps used by businesses are not equipped for the upcoming EU General Data Protection Regulation (GDPR), according to the latest study from cloud security services provider Netskope.

The report comes hot on the heels of a survey conducted by the firm back in February which argued businesses were not sure if they would keep up with the upcoming legislation, which is set to drop in two years’ time and includes provisos over the right to be forgotten, as...

Capacity, redundancy, and transparency: The three big cloud question marks

(c)iStock.com/anilakkus

From my perch in the cloud computing ecosystem, I see three concerns on the horizon for cloud computing: capacity, redundancy, and transparency.

In certain ways, these topics are inter-related with security. Certainly, from the customer’s viewpoint, they all touch on perceptions of value and trust. And possible solutions, at least to my mind, tend to reflect old-school logic around risk management principles.

I know from my conversations with other professionals in the cloud...

By Christine Miyachi, 25 May 2016, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Security.

Cloud security strategies: In the land of the blind, the one eyed man is king

(c)iStock.com/Kalawin

New research released today by enterprise cloud hosting provider iland has revealed almost half (47%) of security workers “simply trust” their cloud providers to meet security agreements.

The findings, from 100 IT decision makers and security experts, appear in a study whose title – ‘Blind Trust is Not a Security Strategy: Lessons from Cloud Adopters’ – lays the problem on thick. Even though 78% of firms polled are using the cloud in some capacity, and...

By James Bourne, 24 May 2016, 0 comments. Categories: Data Management, Security, Vendors.

An update on security in the hybrid cloud: Where do we go from here?

(c)iStock.com/BrianAJackson

Even in mid-2016, very few who are serious about cloud computing will tell customers that out of the box public cloud services are as secure as their corporate data centres. At the same time no-one would suggest introducing mission critical applications and data into a brand new data centre environment without first planning and implementing proper physical, network, server, and application security controls.

Many organisations distrust moving corporate data and application assets...

By David Auslander, 24 May 2016, 0 comments. Categories: Hybrid, Infrastructure, Security.

How Santander embraced cloud storage for greater productivity and data security

(c)iStock.com/tupungato

If you were to think of an industry that would be naturally reluctant to embrace technologies such as cloud and mobility for reasons of sensitive data privacy, which one would you think of first? The two most common answers are usually healthcare and banking – so it is therefore interesting to note how Santander has gone all in on enterprise file sync and share (EFSS) with cloud storage provider CTERA Networks.

According to the bank, the opportunity to move organisational...

By James Bourne, 17 May 2016, 0 comments. Categories: Case Studies, Enterprise, Security, Software, Storage.