Why a consumer approach to security – with cloud in mind – may help struggling enterprises

Are Amazon and Facebook the standard bearers when it comes to security? According to the latest identity and access management (IAM) study from Gemalto, more than half of respondents say their organisation’s work authentication methods are worse than those offered by the two tech giants.

The study, which polled more than 1,000 IT decision makers globally, found that the continued rise in cloud applications, as well as the similarly shopworn story around device proliferation, means enterprises are...

By James Bourne, 12 March 2018, 0 comments. Categories: Collaboration, Compliance, Security, Software.

Google Cloud announces healthcare APIs and updates – as Apple and Spotify revealed as customers

It has been an interesting week or so for Google Cloud, both directly and indirectly. The company has announced new APIs, updates and customers for its healthcare cloud initiative, while other high-profile customers have been disclosed.

At HiMSS, the healthcare information and management systems society conference, Google launched a new cloud healthcare API, which is better equipped to focus on data types such as HL7, FHIR and DICOM, and also allows customers to crunch the numbers using analytics and machine...

By James Bourne, 06 March 2018, 0 comments. Categories: Compliance, Google, Infrastructure, Security.

Microsoft expands government cloud offerings as company says IT shift ‘reaches tipping point’

Microsoft has beefed up its government cloud offerings, launching government-specific editions of Microsoft 365 and Azure Stack, as well as greater security and compliance in Dynamics 365.

Microsoft 365, which comprises Office 365, Windows 10, and Enterprise Mobility + Security (EMS), and Azure Stack, which extends Azure to on-premises environments, are being upgraded as Microsoft acknowledges faster acceleration of government organisations moving to the cloud.

“This move is driven largely by the desire...

By James Bourne, 06 March 2018, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Microsoft, PublicSector, Security.

Why cloud is the cornerstone of digital transformation in healthcare

Today every part of the business is subject to new expectations, competitors, channels, threats and opportunities. Every business has the potential to be a digital business. As the numbers of smart, connected devices from phones to cars to wearables are growing, companies that quickly deliver digital solutions or services, and use insights to rapidly optimise their value chain are gaining competitive advantage. Businesses that digitally transform will be able to connect more closely with customers, speed up the pace of...

By Roberto Mircoli, 25 February 2018, 1 comment. Categories: Compliance, Infrastructure, Security.

Cisco and Rackspace come together for multi-cloud security

Multi-cloud continues to be on the agenda – this time, a collaboration between Cisco and Rackspace whereby the former will provide the latter’s customers with security protection for multi-cloud environments.

Rackspace will deploy high volumes of Cisco’s next-generation firewalls and integrate them directly into its services, according to Cisco. The managed cloud provider had previously served as a testing partner for Cisco’s ASA firewall series.

According to the most recent annual...

By James Bourne, 25 February 2018, 0 comments. Categories: Data Management, Security, Vulnerabilities.

Cisco cybersecurity report shows how cloud use rises – and cyberattacks rise with it

Cloud computing usage continues to grow, but at the expense of security as attackers take advantage, according to the latest Cisco annual cybersecurity report.

The study, now in its 11th iteration, puts together threat intelligence and cybersecurity trends from researchers and six technology partners, and found more than a quarter (27%) of security professionals polled use off-premises private clouds. This is up from 20% this time last year.

Of that number, more than half (57%) say they host networks in the...

By James Bourne, 22 February 2018, 0 comments. Categories: Compliance, Research, Security.

Hackers ran crypto mining scripts on Tesla’s cloud, research reveals

Hackers have been running crypto mining scripts on unsecured Kubernetes instances owned by Tesla, according to new research from security monitoring provider RedLock.

According to the study, which analysed public cloud environments monitored by RedLock – more than 12 million resources processing petabytes of network traffic – the unsecured Kubernetes pod exposed access credentials to Tesla’s Amazon Web Services (AWS) environment. From there, the environment contained an AWS S3 bucket which...

By James Bourne, 21 February 2018, 0 comments. Categories: Containers, Infrastructure, Security.

The importance of getting security on-board early in cloud projects

It goes without saying that security is a vital part – the most vital part – of cloud projects. But getting security engagement in early will make the whole process easier, from reduced risk of data loss to quicker project delivery.

That is the key finding from a new report by Hurwitz & Associates. The paper, sponsored by Lacework and titled ‘Balancing Velocity and Security in the Cloud’, polled 85 IT leaders from the Americas and Europe and examined the importance of automation in...

By James Bourne, 06 February 2018, 0 comments. Categories: Data Management, Infrastructure, Research, Security.

Analysing security solutions in cloud computing technology

Ever more companies are proving that cloud computing continues to be a major trend in the IT field. For instance, IDC recently predicted that spending on public cloud services would reach $160 billion by the end of this year.

When it comes to security, however, the same issues and concerns persist today as they did several years ago. Take any research report which asks about organisations’ concerns with...

By Dariusz Wójcik, 30 January 2018, 0 comments. Categories: Data & Analytics, Data Management, Security, Vulnerabilities.

Amazon Web Services acquires advanced threat platform provider Sqrrl

Amazon Web Services (AWS) has acquired Sqrrl, an advanced threat detection platform provider, according to an announcement from the latter.

A statement from Mark Terenzoni, CEO of Sqrrl, explained: “We’re thrilled to share that Sqrrl has been acquired by Amazon. We will be joining the Amazon Web Services family, and we’re looking forward to working together on customer offerings for the future.”

Sqrrl offers a ‘threat hunting’ platform which combines technology...

By James Bourne, 29 January 2018, 0 comments. Categories: Amazon, M&A, Security.