The rise of SD-WAN: How scaling cloud services is key to growing a digital business

  • 93% of enterprises are securing remote locations with a centralised approach that rarely scales to secure every endpoint and identity of remote branch locations, leaving an enterprise more vulnerable to a breach
  • Enabling network security is the greatest challenge enterprises face when managing a highly distributed network with numerous remote locations
  • In an era of cloud-first networks, nine out of 10 companies are still relying on centrally managed networks that don’t scale for remote system users, creating productivity bottlenecks
  • 75% of enterprises experience...

By Louis Columbus, 18 October 2019, 0 comments. Categories: Enterprise, Infrastructure, Research, Scalability, Security.

Moving from DevOps to modern ops: Why there is no room for silos when it comes to cloud security

It started with DevOps. Then there was NetOps. Now SecOps. Or is it DevSecOps? Or maybe SecDevOps?

Whatever you decide to call it, too often the end result is little more than the same old siloes with shiny new names. We've become so focused on "what do we call these folks" that we sometimes forget "what is it we're trying to...

By Lori MacVittie, 15 October 2019, 0 comments. Categories: Data & Analytics, Data Management, DevOps, Security.

Why the future of data security in the cloud is programmable

It’s the way software used to be purchased, and often still is. A CEO, or GM, or line-of-business owner calls into IT, and the security and compliance teams, to let them know that they are purchasing a new piece of software to drive innovation in how they deliver their products or services. Because the software needs to be customised, integrated and controlled in the company’s on-prem or cloud environment, the IT team needs to deploy it and the security team needs...

By Dave Sikora, 14 October 2019, 0 comments. Categories: Data & Analytics, Data Management, Developers, Security.

Organisations struggling with sensitive cloud data as they shun security-first approach

Corporate data may be reaching a tipping point in the cloud – but security policies are yet to follow it.

That is the key finding from a new report by security provider Thales. The study, which was put together by the Ponemon Institute and which polled more than 3,000 IT and IT security practitioners across eight countries, found that while almost half (48%) of corporate data was in the cloud, less than a third (32%) of...

By James Bourne, 10 October 2019, 0 comments. Categories: Data & Analytics, Data Management, Research, Security, Vulnerabilities.

Eradicate human error and make your cloud implementation a picnic

Sunshine, sandwiches, scenic views, and not a care in the world besides the occasional wasp. Everyone loves a picnic.

Unfortunately, the same cannot be said for PICNIC, an enduring acronym in IT circles standing for Problem In Chair, Not In Computer. The term, dating back to the 1980s, was first employed by frustrated IT professionals weary of dealing with computer problems arising from user error rather than any actual issues with the...

By Matt Lock, 08 October 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security, Vulnerabilities.

Three reasons why killing passwords will improve your cloud security

By Louis Columbus, 27 September 2019, 0 comments. Categories: Data Management, Security, Software, Vulnerabilities.

Best security practices for migrating to the cloud: A guide

As more businesses embark on their digital transformation journey and shift towards a mobile cloud computing model, they must rethink their entire security architecture. Migrating to the cloud effectively marks the end of the traditional network perimeter, which means that the standard security protocols designed to protect the perimeter are no longer fit for purpose. 

A recent report from Outpost24 found that...

By Brian Foster, 26 September 2019, 0 comments. Categories: Best Practice, Security.

Puppet’s 2019 State of DevOps report: How security needs to fit into continuous delivery

You’ve got the processes in place for a revamped software delivery cycle in your organisation. The foundation has been built, the stack is in place and the culture is going in the right direction. What are you missing?

Security in DevOps is an ‘unrealised ideal’ and a key step in moving from DevOps good practice to best practice. That’s according to the latest Puppet State of DevOps Report, published earlier today. 

The report, the eighth in total, explored the various journeys...

By James Bourne, 25 September 2019, 0 comments. Categories: DevOps, Research, Security.

Oracle wants to say goodbye to shared responsibility by ramping up autonomous next-gen cloud approach

The concept of shared responsibility in cloud computing is one which continues to be, if not so much a rancour, an ongoing concern. In February, for instance, research from Check Point Software found that, for more than a quarter of respondents, cloud security was the provider’s responsibility.

By James Bourne, 17 September 2019, 0 comments. Categories: Applications, Data & Analytics, Infrastructure, Security, Software.

Lacework secures $42 million in funding round to forge ahead with ‘Snowflake for security’ plan

Lacework, a provider of end-to-end cloud security automation across the biggest public clouds, has raised $42 million (£34m) in a financing round aimed at building momentum and educating security teams.

The funding, which was put together by Sutter Hill Ventures and Liberty Ventures, will be aimed at ‘supporting product innovation and go-to-market activities to help educate security, compliance and DevOps teams...

By James Bourne, 12 September 2019, 0 comments. Categories: DevOps, Economy, Infrastructure, Security.