How to prevent AIOps from becoming just another cog in the machine

Over the past few years, companies have been rapidly transitioning to dynamic, hybrid cloud environments in a bid to keep up with the constant demand to deliver something new. However, while the cloud provides the agility businesses crave, the ever-changing nature of these environments has generated unprecedented levels of complexity for IT teams to tackle.

Traditional performance management strategies have been stretched to...

How leveraging APIs will help to enable comprehensive cloud security

Cloud computing has utterly transformed the IT industry, requiring organisations to make fundamental changes to how they design, deploy, manage and optimise their security strategy. Many organisations, however, are simply using the same security model they have relied on for over a decade in their traditional networks to the cloud. But true cloud security requires more than deploying isolated cloud-enabled network security tools to protect cloud-based resources.

The future...

By Lior Cohen, 24 May 2019, 0 comments. Categories: Data & Analytics, Developers, Security, Vulnerabilities.

Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Do cryptographic keys belong in the cloud?

Thanks to the cloud, organisations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments. Medium-sized companies no longer have to pay to build their own infrastructure, which makes the cloud especially appealing to this market.

However, the cloud still suffers from security issues....

By Brian Jenkins, 24 January 2019, 0 comments. Categories: Data & Analytics, Security, Vulnerabilities.

Predicting the future of next-gen access and Zero Trust Security in 2019: Challenges ahead

Bottom line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognising that identities are the new security perimeter.

The faster any digital business is growing, the more identities, devices and network endpoints proliferate. The most successful businesses of 2019 and beyond are actively creating entirely new digital business models today....

By Louis Columbus, 22 January 2019, 0 comments. Categories: Data & Analytics, Privacy, Security, Vulnerabilities.

New malware strain can evade and uninstall cloud security software, researchers warn

The good news: your organisation has finally gotten around to installing some top of the range cloud security tools. The bad news: malware has been developed which can evade detection from them.

The nefarious discovery from threat actor Rocke was made by Palo Alto Networks Unit 42, with the security researchers noting that it was ‘to the best of [their] knowledge the first malware family that developed the unique capability to target and...

By James Bourne, 18 January 2019, 0 comments. Categories: Blockchain, Infrastructure, Security, Vulnerabilities.

AWS launches new security offering which mitigates S3 misconfigurations – if customers get it right

Amazon Web Services (AWS) has announced extra steps to ensure customers’ S3 buckets don’t become misconfigured – but don’t assume responsibility has been taken away from the customer.

The new service, Amazon S3 Block Public Access, can work at the account level, on individual buckets, as well as future buckets created. Users can also block existing public access, or ensure public access is not available for...

By James Bourne, 20 November 2018, 0 comments. Categories: Amazon, Data Loss, Data Management, Security, Vulnerabilities.

A guide to the key principles of chaos engineering

Chaos engineering can be defined as experiments over a distributed system at scale, which increases the confidence that the system will behave as desired and expected under undesired and unexpected conditions.

The concept was popularised initially by Netflix and its Chaos Monkey approach. As the company put it as far back as 2010: "The...

By Nazareno Feito, 12 November 2018, 0 comments. Categories: Architecture, Disaster Recovery, Infrastructure, SLA, Vulnerabilities.

How to protect healthcare IoT devices in a Zero Trust world

  • Over 100 million healthcare IoT devices are installed worldwide today, growing to 161m by 2020, attaining a Compound Annual Growth Rate (CAGR) of 17.2% in just three years according to Statista.
  • Healthcare executives say privacy concerns (59%), legacy system integration (55%) and security concerns (54%) are the top three barriers holding back Internet of Things (IoT) adoption in healthcare organizations today according to the 

By Louis Columbus, 08 November 2018, 0 comments. Categories: Applications, Data & Analytics, Security, Software, Vulnerabilities.

Gartner’s latest Magic Quadrant shows the need for cloud access security brokers going forward

The role of the cloud access security broker (CASB) will become ever-more important in the context of organisational security.

According to analyst firm Gartner, through 2023 “at least 99%” of cloud security issues will be the fault of the customer. The notion of shared responsibility – one which regular readers of this publication may well be sick of hearing given its frequency – needs to be hammered...

By James Bourne, 05 November 2018, 0 comments. Categories: Infrastructure, Research, Security, Vulnerabilities.