Digital trust: Why enterprise IT compliance matters

Do you wonder, are there significant benefits for building a culture of digital trust? New research has uncovered a direct connection between the cause and effect of bad actors in organisations across the globe. Information technology has many uses, but business leaders must be mindful of compliance.

Twenty-nine percent of employees observed at least one compliance violation at work in 2016 or 2017, according to the latest worldwide market study by Gartner. The survey, which sampled more than 5,000 employees...

By David H Deans, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Enterprise, Security.

WikiLeaks claims to publish confidential AWS data centre location information

WikiLeaks has published what it claims is a 'highly confidential' document outlining the addresses and operational details of Amazon Web Services (AWS) data centres.

The whistle-blowing organisation claims to have published the document, originating from late 2015, as an attempt to shed light on the 'largely hidden' nature of cloud infrastructure locations.

"While one of the benefits of the cloud is the potential to increase reliability through geographic distribution of computing...

By James Bourne, 15 October 2018, 0 comments. Categories: Amazon, Data Centres, Data Management, Data Sovereignty, Infrastructure, Privacy.

Snowflake secures $450m funding for expansion and further multi-cloud exploration

The money just keeps rolling in for Snowflake Computing. The San Mateo-based data warehousing provider has announced $450 million (£341m) in additional growth funding to help grow its organisation and explore new strategies.

Snowflake offers a comprehensive and complete data warehouse – in other words, repositories of integrated data from at least one source, usually more – in the cloud, with the capability...

By James Bourne, 12 October 2018, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Economy, Software.

How identities are the new security perimeter

  • Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee.
  • 18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
  • Apple employees in Ireland have been offered as much as €20,000 ($22,878) in exchange for their privilege access credentials in 2016, according to 

By Louis Columbus, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Security, Vulnerabilities.

Ignore multi-cloud today and risk becoming irrelevant in five years, report warns

Multi-cloud initiatives continue to be of great importance to European organisations – and those who aren’t heeding the warning signs today will feel the pinch in five years’ time.

That’s according to a new study from research firm Foresight Factory, alongside application network technology provider F5 Networks. The study, titled ‘The Future of Multi-Cloud’, drew on contributions from...

By James Bourne, 27 September 2018, 0 comments. Categories: Data & Analytics, Data Management, Infrastructure, Research.

Microsoft makes Azure Data Box generally available for heavy duty data migration

More and more enterprise data is being transferred to the cloud, but sometimes the journey can break the network's back - which calls for less virtual and more physical solutions.

Microsoft has announced the general availability of Azure Data Box, a physical box which organisations can order, fill up, and then return to Redmond for it to be uploaded to an Azure environment. 

Companies and users can store up to 100 TB per standard box, with variables either way. The newly announced Data Box Heavy can...

By James Bourne, 26 September 2018, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Hardware, Microsoft.

Five Kubernetes role-based access control mistakes to avoid

If you run workloads in Kubernetes, you know how much important data is accessible through the Kubernetes API—from details of deployments to persistent storage configurations to secrets. The Kubernetes community has delivered a number of impactful security features in 2017 and 2018, including Role-Based Access Control (RBAC) for the Kubernetes API.

RBAC is a key security feature that protects your cluster by allowing you to control who can access specific API resources. Because the feature is relatively...

By Kaizhe Huang, 26 September 2018, 0 comments. Categories: Containers, Data & Analytics, Data Management, Developers, Security.

Why healthcare providers need Zero Trust Security to boost their digital initiatives

  • 58% of healthcare systems breach attempts involve inside actors, which makes this the leading industry for insider threats today.
  • Ransomware leads all malicious code categories, responsible for 70% of breach attempt incidents.
  • Stealing laptops from medical professionals’ cars to obtain privileged access credentials to gain access and install malware on healthcare networks, exfiltrate valuable data or sabotage systems and applications are all common breach strategies.

These and many other fascinating insights are from 

By Louis Columbus, 11 September 2018, 0 comments. Categories: Applications, Best Practice, Data & Analytics, Data Management, Security.