An enterprise security blind spot: Are cybercriminals hiding in your SSL traffic?

SSL traffic is pervasive in today’s enterprises and is expected to grow rapidly over the next several years; according to Gartner, SSL/TLS traffic now comprises 15% to 25% of total web traffic. The problem is the bad guys have noticed.

This report from Venafi examines how enterprises can eliminate the blind spots in SSL traffic, maximise the powers of decryption, and uncover threats.

By James Bourne, 19 July 2016, 0 comments. Categories: Enterprise, Privacy, Security.

ISO compliance in the cloud: Why should you care, and what do you need to know?

(c)iStock.com/hh5800

More and more organisations are looking to move to cloud to benefit from scalability, cost reduction and the ability to launch new service offerings fast.

The dynamic nature of cloud however necessitates security and compliance controls that frankly can be daunting. Issues around mobility and multi-tenancy, identity and access management, data protection and incident response and assessment all need to be addressed. And with multiple modes – SaaS, PaaS, IaaS, public, private, hybrid...

By Frank Krieger, 18 July 2016, 0 comments. Categories: Compliance, Data Management, Security.

Why cloud security best practices mean engagement from vendors and employees

(c)iStock.com/StockFinland

Ransomware may be the hot topic in the news at the moment, but human error is a greater threat. Human error, in fact, is often the reason ransomware is able to infiltrate a network (by staff members clicking phishing links, for example). It’s also one of the greatest causes of data loss in the cloud. The first part of this series discussed how cloud vendors, shadow...

By Matt Kingswood, 08 July 2016, 0 comments. Categories: Data & Analytics, Data Management, Security, Vendors, Vulnerabilities.

IT skills shortage leading to cybersecurity issues, research argues

(c)iStock.com/maxkabakov

If a security system flags up an issue in your organisation and nobody acts on it, is it even an issue? Many organisations are acting that way, according to a report from Skyhigh Networks and the Cloud Security Alliance (CSA).

The research found that security budgets continue to rise – more than half (53%) of the 220 IT and security professionals polled expect their allocations to go up in the coming year – and the myriad of tools at teams’ disposals is a growing...

By James Bourne, 28 June 2016, 0 comments. Categories: Data Management, Data Sovereignty, Privacy, Security.

Rethinking cyber security: Where does accountability lie?

The many high profile data breaches we have seen splashed across the front pages highlight just how damaging a cyber attack can be on market position, reputation and profits, infiltrating customer data and critical IP. The frequency and success of these attacks also highlights that the existing security strategies of many organisations are dangerously flawed, leaving them wide open to threat, as VMware investigates in this whitepaper downlod.

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise, Security.

The tipping point: Why enterprise security must change

In today's digital world, data is the currency giving businesses the power to act decisively and swiftly, provide rich customer experiences and remain one step ahead of the competition. But as data becomes more valuable, it also becomes more vulnerable.

In this whitepaper, VMware gathered insights from 1,700 IT decision makers and 3,500 office workers from across EMEA and provide 10 important takeaways on the future of enterprise security.

By James Bourne, 24 June 2016, 0 comments. Categories: Enterprise, Security.

Ransomware may be a big culprit for data loss – but it’s the wrong fall guy

(c)iStock.com/Big_Ryan

With researchers seeing a 3500% increase in the use of net infrastructure which criminals use to run ransomware campaigns, it’s not surprising that ransomware has been making big headlines.

The media laments the growing rings of cyber criminals that launch ransomware threats, but there’s another culprit that tends to slip under the radar: people like you and me. Sure, we’re not...

By Matt Kingswood, 22 June 2016, 0 comments. Categories: Data Loss, Data Management, Enterprise, Infrastructure, Security.

More than a quarter of enterprise cloud apps deemed risky, CloudLock argues

(c)iStock.com/LeoWolfert

A new piece of research from cloud security provider CloudLock argues that more than a quarter of cloud apps connected to corporate environments were seen as high risk.

The report, the firm’s Q2 2016 Cloud Cybersecurity Report, gave a generally pessimistic warning over the threats of shadow IT. From 2014 to 2016, CloudLock has observed an almost 30 times increase in apps used under shadow IT, from 5,500 to almost 160,000. What’s more, over half of third party apps are...

By James Bourne, 13 June 2016, 0 comments. Categories: Applications, Research, Security.

Netskope study argues majority of cloud apps are not ready for EU GDPR

(c)iStock.com/FrankRamspott

Three quarters of cloud apps used by businesses are not equipped for the upcoming EU General Data Protection Regulation (GDPR), according to the latest study from cloud security services provider Netskope.

The report comes hot on the heels of a survey conducted by the firm back in February which argued businesses were not sure if they would keep up with the upcoming legislation, which is set to drop in two years’ time and includes provisos over the right to be forgotten, as...

Capacity, redundancy, and transparency: The three big cloud question marks

(c)iStock.com/anilakkus

From my perch in the cloud computing ecosystem, I see three concerns on the horizon for cloud computing: capacity, redundancy, and transparency.

In certain ways, these topics are inter-related with security. Certainly, from the customer’s viewpoint, they all touch on perceptions of value and trust. And possible solutions, at least to my mind, tend to reflect old-school logic around risk management principles.

I know from my conversations with other professionals in the cloud...

By Christine Miyachi, 25 May 2016, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Security.