The top five in-demand cloud security skills for 2016

(c)iStock.com/Jirsak

The cloud computing market continues to expand at a phenomenal rate. According to a recent report from IDC, worldwide spending on public cloud services will grow 19.4% annually through to 2019. Six times the rate of overall IT spend growth, this will double the current spend from $70 billion to $141 billion.

As more businesses transition to the cloud this will drive up demand for IT professionals with the skills to make the most of the technology. A market, which...

By Ed Jones, 20 April 2016, 0 comments. Categories: Compliance, Security, Vulnerabilities.

The key to maximising the advantages of cloud security

(c)iStock.com/LeoWolfert

By Paul Fletcher, Security Evangelist at Alert Logic

Despite the pervasive use of the cloud to handle complex, secure workloads, many organisations question whether the cloud is natively secure. They still think that the security of a system depends on their ability to touch and control a physical device. Visibility from layer one (physical) up to layer seven (application) of the OSI Model gives us security professionals a good gut feeling.

Veteran systems administrators are challenged to both...

By Logicworks, 14 April 2016, 0 comments. Categories: Infrastructure, Security.

Organisations start to address the subtleties of securing 'as a service' propositions

(c)iStock.com/BlackJack3D

According to a recent Verizon report, 94% of companies expect more than a quarter of their workloads to be in the cloud within two years. The enterprise is moving to a cloud model of IT service consumption and delivery for a variety of reasons: IT organisations can become more responsive to business requirements by scaling up on demand, operations are refocused toward the...

By Jeff Denworth, 01 April 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.

Data resilience: Why CEOs and CFOs need to understand the CIO agenda

(c)iStock.com/Akindo

The CIO agenda changes each year, albeit not drastically. In 2015 part of their focus was on hybrid cloud spending, but this year research and analyst firm Gartner says that it’s now about how they enhance the power of digital platforms. The company’s ‘Building the Digital Platform: Insights From the 2016 Gartner CIO Agenda Report’ says: “As digitalisation moves from an...

By Graham Jarvis, 31 March 2016, 0 comments. Categories: CIO, Data & Analytics, Data Management, Security.

Analysing security and regulatory concerns with cloud app migration

(c)iStock.com/baluzek

As businesses look to clouds for faster, more flexible growth, they confront significant challenges from a legacy application base that has varying levels of cloud suitability. It is therefore worth examining how security and compliance requirements can impact choice of cloud or architecture strategies within a cloud. 

Maintaining privacy for data that must be protected for business or regulatory reasons is a substantial concern in cloud migration, public or private. Security and...

By Bryan Solie, 11 March 2016, 0 comments. Categories: Applications, Compliance, Data & Analytics, Data Management, Security.

A warning shot: Why cloud security remains more important than ever

(c)iStock.com/LeoWolfert

With all the recent well-publicised hacking and malware attacks, not to mention numerous meteorological events that have affected companies around the globe over the last year, IT leaders are very aware of the need for robust cloud security and compliance.

That said it is infact now easier for companies to engage in poor security practices because users do not have the same control over their cloud infrastructure that they have over their own on-premise infrastructure. Often,...

By Monica Brink, 10 March 2016, 0 comments. Categories: Applications, Infrastructure, Security.

The cloud is becoming more secure – but it’s still costly to keep it that way

(c)iStock.com/RyanKing999

Fears over cloud security will continue to linger, but the situation is improving: almost two thirds (64%) of enterprises polled by analyst house Clutch argue cloud infrastructure is more secure than legacy systems.

36% of the 300 respondents polled said cloud was much more secure than legacy infrastructure, compared to 28% who argued it was “somewhat” more secure. Only 11% of respondents argued cloud was in any way less secure, with 1% saying it was ‘much...

By James Bourne, 04 March 2016, 0 comments. Categories: Infrastructure, Research, Security.

MWC takeaways: Making sure your infrastructure is secure for the connected world

(c)iStock.com/Maciej Noskowski

With Mobile World Congress over for another year, I’ve now had a chance to digest everything that was on show last week. This conference, which is arguably the planet’s best venue for mobile industry networking, looked at the Internet of Things and the connected world, anything and everything from developments such as 5G to newly connected toothbrush devices that ensure consumers brush their teeth as the dentist intended.

What all these new technology innovations...

By Monica Brink, 02 March 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.

The EU General Data Protection Regulation: Prepare for change

(c)iStock.com/xijian

The EU’s wide-ranging rules on General Data Protection Regulation (GDPR) are set to significantly impact all businesses, whether in the EU or further abroad. From 2018, any organisation that collects, uses or shares personal information about European citizens will have to demonstrate compliance with the hotly contested law. This includes using various techniques to ensure that the protection of data is built into the design and infrastructure of an organisation by default.

Securing the data...

By Iain Chidgey, 29 February 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Data Sovereignty, Security.

Enterprises given another warning over cloud app GDPR compliance

(c)iStock.com/DWalker44

More than 4% of enterprises have put their data at risk by sanctioning cloud apps laced with malware, according to research released by cloud security provider Netskope.

The study, which uses anonymised data from millions of users in the global Neskope Active Platform, found 88% of apps used were not enterprise-ready, while almost half (43%) of apps analysed keep data for more than a week after the service has ended, going against the upcoming EU General Data Protection Regulation...

By James Bourne, 26 February 2016, 0 comments. Categories: Applications, Data Management, Data Sovereignty, Security.