How Abbots Care gained greater assurances around data security with a revamped DR and backup strategy

Case study All data is equal, but for some industries, data is more equal than others. As a result, great care needs to be taken when it comes to keeping that data secure, whether in the cloud or anywhere else.

Healthcare, across its various channels, is a classic example. Some healthcare organisations are moving with less trepidation towards the cloud. In February, for instance,

By James Bourne, 30 August 2019, 0 comments. Categories: Case Studies, Data & Analytics, Data Management, Security, Software.

The continuing rise of Kubernetes analysed: Security struggles and lifecycle learnings

Analysis The rapid adoption of container technology, DevOps practices, and microservices application architectures are three of the key drivers of modern digital transformation. Whether built in the cloud, on-premises, or in hybrid environments, containerisation has proved to be significantly more advantageous in terms of scalability, portability, and continuous development and improvement.

More recently, organisations have began to standardise on Kubernetes as their container orchestrator.

By Ali Golshan, 29 August 2019, 0 comments. Categories: Containers, Developers, Kubernetes, Platform, Research, Security.

Alibaba, Google Cloud and Microsoft among inaugural members of cloud security consortium

The Linux Foundation has announced the launch of a new community of tech all-stars focused on advancing trust and security for cloud and edge computing.

The open source community, dubbed the Confidential Computing Consortium (CCC), has 10 initial members: Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent.

“Current approaches in cloud...

By James Bourne, 28 August 2019, 0 comments. Categories: Alibaba, Google, Infrastructure, Microsoft, OpenSource, Security.

How does privileged access security work on AWS and other public clouds?

Bottom line: Amazon’s Identity and Access Management (IAM) centralises identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today.

AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do other public cloud providers. Designed to provide customers with...

By Louis Columbus, 27 August 2019, 0 comments. Categories: Amazon, Data Management, Infrastructure, Public, Security, Vulnerabilities.

VMware stokes VMworld fires with Pivotal and Carbon Black acquisitions

Next week is going to be a busy one for VMware as the company’s VMworld event kicks off in San Francisco. There will be plenty of talking points – and the virtualisation and end user computing provider has opted to add two more with the acquisitions of Pivotal Software and Carbon Black for a combined $4.8 billion (£3.93bn).

Pivotal, at $2.7bn, edged out endpoint security provider Carbon Black ($2.1bn) in...

By James Bourne, 23 August 2019, 0 comments. Categories: M&A, Security, Software, Virtualisation, VMware.

Cloud Security Alliance publishes ‘egregious 11’ list of top threats to the cloud

If one other thing besides death and taxes is certain, it is that cloud security will remain a key talking point. Whose responsibility is it exactly – and why does the shared responsibility model continue to cause havoc?

Some areas however can be nailed down much more solidly. The Cloud Security Alliance (CSA) has issued what it calls the ‘egregious 11’ in its latest report, giving organisations an up-to-date...

By James Bourne, 19 August 2019, 0 comments. Categories: Architecture, Infrastructure, Research, Security, Vulnerabilities.

How the rise of 5G will disrupt cloud computing as we know it

The rollout of 5G has begun in earnest. Verizon and other US carriers have already unveiled the tech and its groundbreaking speeds in a few key markets, and across the pond in the UK, some major carriers are widely expected to deploy 5G later this summer. Many expect 5G to be equally as disruptive – if not more so – than cloud computing has been over the past few years.

All of this raises questions when it comes to...

By Marty Puranik, 19 August 2019, 0 comments. Categories: Collaboration, Developers, Security, Software.

What’s in your cloud? Key lessons to learn after the Capital One breach

The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.

The attack behaviours associated with the Capital One breach that occurred in March 2019 are...

By Chris Morales, 16 August 2019, 0 comments. Categories: Amazon, Data Management, Security, Vulnerabilities.

How public cloud will become the driving force for connected cars

Opinion The cars we drive today are very different to the first models introduced in the late 1800s. Every aspect of the driving experience has evolved, innovating to meet customer needs, industry standards and to ensure passenger safety. Our new cars now offer voice assistants, can be fuelled by electric power, and typically include satellite navigation and collision detection as standard.

It’s time...

By Steve Meek, 12 August 2019, 0 comments. Categories: Industry, Infrastructure, Public, Security.

Why it's time to make continuous cloud security part of your developer journey

Cloud computing hasn’t always been synonymous with great security. However, despite early fears that it was less secure than data centres, the cloud is now considered a useful - and secure - solution for most critical business functions. While some of its earliest adopters could afford to be somewhat blasé about security, that’s no longer the case. The latest generation of cloud entrants mainly operate in finance and government sectors, meaning...

By Gemma Allen, 09 August 2019, 0 comments. Categories: Developers, DevOps, Infrastructure, Security.