Capital One confirms data breach, cites cloudy approach as key to swift resolution

Capital One has confirmed a ‘data security incident’ which affected more than 100 million customers in the US and Canada – and while Amazon Web Services (AWS) has been identified as the receptacle in which the data was stolen, both customer and vendor appear not to be to blame.

Paige A. Thompson, otherwise known as ‘erratic’, was arrested on Monday and appeared in court in Seattle on a charge of computer fraud...

By James Bourne, 30 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Infrastructure, Security.

Google confirms network congestion as contributor to four-hour cloud outage

Google has confirmed a ‘network congestion’ issue which affected various services for more than four hours on Sunday has since been resolved.

A status update at 1225 PT noted the company was investigating an issue with Google Compute Engine, later diagnosed as high levels of network congestion across eastern USA sites. A further update arrived at 1458 to confirm engineering teams were working on the issue before the...

By James Bourne, 03 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Google, Infrastructure, SLA, Vendors.

Doubling down on disaster recovery-as-a-service – for business continuity and beyond

The prospect of an IT outage is one of the key issues that keeps IT professionals awake at night.  In the past two years, 93% of organisations have experienced tech-related business disruption and, as a result, one out of five experienced major reputational damage and permanent loss of customers. From natural...

Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Companies' cloud security getting better - but slowly, argues SANS Institute

Cloud security best practices are improving - but there is still a long way to go, according to a new report from SANS Institute.

The study, which polled several hundred respondents across the IT spectrum, came about, as author Dave Shackleford put it, as the result of concerning news stories around the security space. IDC found back in April that worldwide IT security spending would hit $103.1 billion by the end of...

By James Bourne, 17 May 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

Why IT security solutions spending will reach $133.8 billion

Cybersecurity investment continues to be a top priority for most IT organizations. Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019 -- that's an increase of 9.4 percent over 2018. The pace of growth will continue as industries invest heavily in IT security solutions to meet a wide range of cyber threats.

According to the latest market study by International Data Corporation (IDC), worldwide spending on IT security solutions will achieve a...

By David H Deans, 09 April 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

The five key things every executive needs to know about identity and access management

  • For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter.
  • Organisations need to recognise that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect camouflage for data breaches.
  • 74% of data breaches start with privileged credential...

By Louis Columbus, 08 April 2019, 0 comments. Categories: Data Loss, Data Management, Enterprise, Security, Software.

Five ways to demystify Zero Trust security – and the vendors who are pushing it

Bottom line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key.

Analytics, Zero Trust dominated RSA

Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed to have Zero Trust Security solutions at RSA, with each one defining the concept in a slightly different way.

RSA has evolved into one of the highest energy enterprise-focused...

By Louis Columbus, 25 March 2019, 0 comments. Categories: Compliance, Data & Analytics, Data Loss, Data Management, Security.

Practical cloud considerations: Security and the decryption conundrum

Compute in the cloud may be cheap but it isn't free. Most of today’s apps are delivered via secure HTTP. That means TLS or the increasingly frowned upon SSL. It means cryptography, which traditionally has been translated to mean performance problems.

Thanks to advances in technology, CPUs are now incredibly fast and many client (and...

Check Point exposes yet more shared responsibility misunderstandings for cloud security

Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cloud provider.

These and other worrying findings have appeared in Check Point’s latest study. The 2019 Security Report, of which this is the third instalment and combined...

By James Bourne, 22 February 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security.