Addressing cloud sprawl: Combining security best practices with business foundations

The rate of cloud adoption has been nothing short of remarkable. According to IDG, 90% of organisations will have some portion of their applications or infrastructure running in the cloud this year, with the rest expected to follow suit by 2021. And while most organisations currently run more than half (53%) of their business on traditional networks,

By Lior Cohen, 13 March 2019, 0 comments. Categories: Adoption, CIO, Data & Analytics, Infrastructure, Security.

Check Point exposes yet more shared responsibility misunderstandings for cloud security

Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cloud provider.

These and other worrying findings have appeared in Check Point’s latest study. The 2019 Security Report, of which this is the third instalment and combined...

By James Bourne, 22 February 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security.

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data protection provider Virtru has...

By James Bourne, 19 February 2019, 0 comments. Categories: Data & Analytics, Data Loss, Privacy, Research, Security.

Healthcare firms go for the hybrid cloud approach with compliance and connectivity key

It continues to be a hybrid cloud-dominated landscape – and according to new research one of the traditionally toughest industries in terms of cloud adoption is now seeing it as a priority.

A report from enterprise cloud provider Nutanix has found that in two years’ time, more than a third (37%) of healthcare organisations polled said they would deploy hybrid cloud. This represents a major increase from less than a fifth...

By James Bourne, 18 February 2019, 0 comments. Categories: Compliance, Containers, Infrastructure, Research, Security.

How to tackle the multi-cloud security challenge

A growing number of organisations are adopting a multi-cloud strategy in a bid to avoid over-reliance upon one vendor and reduce the risk of threats like DDoS attacks. This generates cost savings, yields performance optimisation, and improves up-time to ensure that operations run at all times.

Abandoning a ‘one-cloud-fits-all’ approach and using multiple services from different cloud providers delivers a raft of...

By Steve Armstrong, 11 February 2019, 0 comments. Categories: Enterprise, Infrastructure, Security.

Microsoft cites ‘layers’ of Azure and cloud depth in more positive financial results

Microsoft’s investor relations team is evidently not frightened about repeating itself when it comes to financial announcements season. “Microsoft Cloud drives record fourth quarter results,” the company proclaimed in July; “Microsoft Cloud strength powers record first quarter results,” it tooted in October; and now, “Microsoft Cloud strength fuels second quarter results.”

Given the...

By James Bourne, 31 January 2019, 0 comments. Categories: Economy, Infrastructure, Microsoft, Security.

Understanding Kubernetes today: Misconceptions, challenges and opportunities

Any discussion of Kubernetes is best started with an understanding of why we need Kubernetes. Kubernetes helps us manage containers, which dominate application development now because they enable portability, faster application development, and greater independence for developers. Once we started using containers in great volume, we needed a way to automate the setup, tear down, and management of containers - that's what Kubernetes does.

By Ali Golshan, 30 January 2019, 0 comments. Categories: Containers, Developers, Infrastructure, Platform, Security.

Exploring specific security pain points with enterprise cloud adoption

While the enterprise push to public cloud continues apace, it does not hurt to hear of figures which puts the scope of the journey in perspective.

According to new figures from Ping Identity, only one in five enterprises polled said they have more than half of their IT infrastructure hosted in the public cloud. Three quarters (75%) in comparison have a hybrid approach.

Perhaps not surprisingly, the key aspect holding these organisations back is security. 43% of the 300 US-based respondents said it was the...

By James Bourne, 25 January 2019, 0 comments. Categories: Adoption, Enterprise, Security.

Do cryptographic keys belong in the cloud?

Thanks to the cloud, organisations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments. Medium-sized companies no longer have to pay to build their own infrastructure, which makes the cloud especially appealing to this market.

However, the cloud still suffers from security issues....

By Brian Jenkins, 24 January 2019, 0 comments. Categories: Data & Analytics, Security, Vulnerabilities.

Predicting the future of next-gen access and Zero Trust Security in 2019: Challenges ahead

Bottom line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognising that identities are the new security perimeter.

The faster any digital business is growing, the more identities, devices and network endpoints proliferate. The most successful businesses of 2019 and beyond are actively creating entirely new digital business models today....

By Louis Columbus, 22 January 2019, 0 comments. Categories: Data & Analytics, Privacy, Security, Vulnerabilities.