How to improve privileged users' security experiences with machine learning

Bottom line: One of the primary factors motivating employees to sacrifice security for speed are the many frustrations they face, attempting to re-authenticate who they are so they can get more work done and achieve greater productivity.

How bad security experiences lead to a breach

Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. 

By Louis Columbus, 31 May 2019, 0 comments. Categories: Applications, Compliance, Security, Software.

Why the real multi-cloud motivator is choice - rather than lock-in

Multi-cloud is one of the biggest initiatives for enterprises today; however, if you analyse the justification for this trend, so much of it is driven by fear — fear of lock-in, fear of outages, fear of cost. And while those concerns may be valid, the enterprises that are realising the value of multi-cloud have an even more compelling reason for it: choice.

A few years ago, battle lines were drawn. For the most part you either used AWS, Azure, or GCP in addition...

Doubling down on disaster recovery-as-a-service – for business continuity and beyond

The prospect of an IT outage is one of the key issues that keeps IT professionals awake at night.  In the past two years, 93% of organisations have experienced tech-related business disruption and, as a result, one out of five experienced major reputational damage and permanent loss of customers. From natural...

How leveraging APIs will help to enable comprehensive cloud security

Cloud computing has utterly transformed the IT industry, requiring organisations to make fundamental changes to how they design, deploy, manage and optimise their security strategy. Many organisations, however, are simply using the same security model they have relied on for over a decade in their traditional networks to the cloud. But true cloud security requires more than deploying isolated cloud-enabled network security tools to protect cloud-based resources.

The future...

By Lior Cohen, 24 May 2019, 0 comments. Categories: Data & Analytics, Developers, Security, Vulnerabilities.

Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Companies' cloud security getting better - but slowly, argues SANS Institute

Cloud security best practices are improving - but there is still a long way to go, according to a new report from SANS Institute.

The study, which polled several hundred respondents across the IT spectrum, came about, as author Dave Shackleford put it, as the result of concerning news stories around the security space. IDC found back in April that worldwide IT security spending would hit $103.1 billion by the end of...

By James Bourne, 17 May 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

Why IT security solutions spending will reach $133.8 billion

Cybersecurity investment continues to be a top priority for most IT organizations. Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019 -- that's an increase of 9.4 percent over 2018. The pace of growth will continue as industries invest heavily in IT security solutions to meet a wide range of cyber threats.

According to the latest market study by International Data Corporation (IDC), worldwide spending on IT security solutions will achieve a...

By David H Deans, 09 April 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

Bitglass secures $70m series D funding to further enhance CASB space

Cloud access security broker (CASB) Bitglass has announced a $70 million (£53.6m) funding round aimed at consolidating its leadership of the CASB and cloud security market.

The round, a series D, included a new investor in the shape of Quadrille Capital, as well as existing investors Future Fund, New Enterprise Associates (NEA), Norwest, and Singtel Innov8. NEA, as regular readers of this publication will be aware, is a regular investor in the cloud space, with...

By James Bourne, 08 April 2019, 0 comments. Categories: Economy, Infrastructure, Security, Software.

The five key things every executive needs to know about identity and access management

  • For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter.
  • Organisations need to recognise that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect camouflage for data breaches.
  • 74% of data breaches start with privileged credential...

By Louis Columbus, 08 April 2019, 0 comments. Categories: Data Loss, Data Management, Enterprise, Security, Software.

Financial services moving to hybrid cloud – but rearchitecting legacy systems remains a challenge

The move to hybrid cloud is one which virtually every industry is undertaking – but the financial services industry is getting there ahead of most.

According to the latest data issued by Nutanix for its Enterprise Cloud Index Report, more than one in five financial organisations polled (21%) are deploying a hybrid cloud model today. This is up from the global average of 18.5%. 91% of those polled said hybrid cloud was their ‘ideal’ IT...

By James Bourne, 05 April 2019, 1 comment. Categories: Adoption, Hybrid, Industry, Infrastructure, Research, Security.