How cloud IAM is driven by the need for secure and robust enterprise governance

(c)iStock.com/ismagilov

The emergence of the Internet has given birth to a number of cloud-based technologies and services to cater to a wide audience. There has been a significant rise in the number of users and enterprises who are adapting to the radical changes cloud technologies have brought about in enterprise handling and management.

The colossal volumes of data and information held by any business organisation run the sheer risk of intrusion from malicious insiders, network threats, hacking attacks,...

By Nitin Chitmalwar, 15 November 2016, 0 comments. Categories: Data & Analytics, Enterprise, Security, Vendors.

Clearing the fog: A vision of security for hybrid clouds

(c)iStock/TARIK KIZILKAYA

Have you ever driven on a high road or mountain pass that’s shrouded by low cloud? You’re at the familiar controls of your vehicle, but you can’t easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. 

Progress can be hazardous unless you take extra precautions. 

The feeling will be familiar to many organisations’ IT teams as they transition some of their business applications and data to the cloud.   

The...

By Donald Meyer, 11 November 2016, 0 comments. Categories: Security.

Mobility, IoT and SDN helping in network refreshes – but security may be an afterthought

(c)iStock.com/plusphoto

Good news and bad news, according to the latest research from Dimension Data; enterprise networks are being refreshed more frequently, but it’s coming at a cost on the security side.

The classic image of the enterprise network sagging under a series of legacy technologies is becoming a thing of the past, the company argues in its latest Network Barometer Report due to the pressure from technologies such as mobility, software defined networking (SDN) and the Internet of Things...

By James Bourne, 09 November 2016, 0 comments. Categories: Industry, Mobility, Security, Software.

Testing your disaster recovery plans: A best practice guide

(c)iStock.com/natasaadzic

When is the right time to test your disaster recovery plans (DRP)?

You should test your DRP in line with any changes to your business. The plan should be updated and changed when new personnel, tech or operational systems are introduced so that it reflects the current state of your company. Whether this is once a month or once a year, the DRP should be an ever-changing document that takes into account any major business alterations as and when they occur. 

One way of ensuring your DRP is...

By Donald Bowker, 02 November 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

Agentless vs. agent-based cloud architectures: Why does it matter?

(c)iStock.com/TERADAT SANTIVIVUT

In the world of security, monitoring and analytics solutions for IaaS cloud, there’s a lot of discussion and debate about agent-based vs. agentless service architectures. Your choice of agentless vs. agent-based cloud security can have a big impact on the efficiency of your day-to-day operations for security and compliance as well as your ability to protect your cloud environment in the future. It’s important to understand what the difference is, and be fully aware...

By Zohar Alon, 31 October 2016, 1 comment. Categories: Amazon, Architecture, Platform, Security.

Advanced cloud security: Standards and automation in a multi-vendor world

(c)iStock.com/maxkabakov

Enterprise IT has long struggled to develop common standards for the security of cloud deployments. With multiple cloud vendors, fast-moving product teams, and a changing security landscape, it is perhaps no wonder that enterprises are left asking:

  • What is the right cloud security standard?
  • What level of security is “good enough”?
  • And most importantly — how do we apply these standards in a consistent way to existing and new cloud environments?

In July 2016, the Ponemon Institute published 

By Logicworks, 27 October 2016, 1 comment. Categories: DevOps, Security, Vendors, Vulnerabilities.

Why it’s time to take new strategies for beating ransomware

(c)iStock.com/Leonardo Patrizi

The sad facts of ransomware are that no-one is immune and attacks are impacting hospitals, schools, government, law enforcement agencies and businesses of all sizes. The increased frequency – and scale – of attacks has organisations thinking differently about their approach to ransomware. According to the FBI, ransomware attacks have increased 35-fold in 2016, resulting in an estimated $209 million paid out every quarter.

In addition, there has recently been a string...

By Jeff Denworth, 26 October 2016, 0 comments. Categories: Privacy, Security, Vulnerabilities.

Box and Skyhigh Networks come together for greater cloud security and governance

(c)iStock.com/LeoWolfert

Cloud security services provider Skyhigh Networks and enterprise cloud storage firm Box have announced a partnership designed to enable greater data governance for Box customers.

Users can identify sensitive data, automatically classify it, and enforce collaboration control policies through Skyhigh and Box Security Classification, all without requiring any change in customer behaviour.

To put the partnership into context, take a situation where an employee uploads a document with...

By James Bourne, 21 October 2016, 0 comments. Categories: Security, Software, Storage.

How cloud storage became a target for hackers – and what can be done about it

(c)iStock.com/4774344sean

With the recent revelations that Yahoo! experienced a hack in 2014 where the accounts of around 500 million users were compromised, it brings back into focus the importance of businesses ensuring their customers’ data is always protected.

More and more businesses are now using the cloud to store their data. As with all new technologies though, hackers will look to exploit any security vulnerabilities they can find. While it is not yet clear whether the attack on Yahoo! was on a...

By David Midgley, 20 October 2016, 0 comments. Categories: Security, Software, Storage.

Microsoft launches cloud services due diligence checklist

(c)iStock.com/cruphoto

Microsoft has launched a cloud services due diligence checklist aimed at providing organisations with more standardised procedures for their potential cloud push.

The checklist is based on the emerging ISO/IEC 19086 standard which focuses on cloud service level agreements, and gives structure to organisations of all sizes and sectors to identify their objectives and requirements, before comparing the offerings of different cloud service providers.

“Cloud adoption is no longer simply a...

By James Bourne, 17 October 2016, 1 comment. Categories: Microsoft, Privacy, Security, SLA.