Netskope secures $168m series F funding to further accelerate enterprise cloud security

Cloud access security broker (CASB) Netskope has announced the close of a series F funding round of $168.7 million (£130.5m) to ‘further cement [its] position as the leader in accelerating security transformation throughout the enterprise’, in the company’s words.

The funding round was led by existing investor Lightspeed Venture Partners – whose interests in the cloud security space have included

By James Bourne, 14 November 2018, 0 comments. Categories: Data & Analytics, Data Management, Economy, Security.

How to protect healthcare IoT devices in a Zero Trust world

  • Over 100 million healthcare IoT devices are installed worldwide today, growing to 161m by 2020, attaining a Compound Annual Growth Rate (CAGR) of 17.2% in just three years according to Statista.
  • Healthcare executives say privacy concerns (59%), legacy system integration (55%) and security concerns (54%) are the top three barriers holding back Internet of Things (IoT) adoption in healthcare organizations today according to the 

By Louis Columbus, 08 November 2018, 0 comments. Categories: Applications, Data & Analytics, Security, Software, Vulnerabilities.

Gartner’s latest Magic Quadrant shows the need for cloud access security brokers going forward

The role of the cloud access security broker (CASB) will become ever-more important in the context of organisational security.

According to analyst firm Gartner, through 2023 “at least 99%” of cloud security issues will be the fault of the customer. The notion of shared responsibility – one which regular readers of this publication may well be sick of hearing given its frequency – needs to be hammered...

By James Bourne, 05 November 2018, 0 comments. Categories: Infrastructure, Research, Security, Vulnerabilities.

Why it’s time to fight back against cyber risk to cloud computing and virtual machines

Cloud computing is now a primary driver of the world’s digital economy. Governments, large corporations and small businesses are increasingly implementing cloud-based infrastructures and solutions to store their sensitive data and manage their operations.

While the cloud offers lower costs, scalability and flexibility, it also expands a company’s risk profile exponentially. In fact, attackers are continually refining their techniques to take advantage of the millions of identical binary templates...

By Simon Hartley, 31 October 2018, 0 comments. Categories: Hacking, Security.

As more companies put sensitive data in the public cloud – so the security threats increase

More organisations are putting their sensitive data in the public cloud – so it comes as no surprise that cloud threats, and mistakes in SaaS, IaaS and PaaS implementation are at an all-time high.

That is the key finding from a new report by McAfee, which argues the old bugaboo of shared responsibility continues to kick in and give organisations a kick in the teeth when it comes to cloud security.

By James Bourne, 30 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Infrastructure, Research, Security, Vulnerabilities.

The key trends driving IT security-related revenues to $133.7 billion

Cybersecurity solutions demand has remained strong during 2018, as more CIOs and CTOs need to ensure that their digital transformation projects have a high degree of digital trust built-in. Data privacy-related legislation has also fuelled the market for expert professional services that are skilled in IT security compliance.

According to the latest global market study by International Data Corporation (IDC), worldwide spending on security-related hardware, software, and services is forecast to reach $133.7...

By David H Deans, 30 October 2018, 0 comments. Categories: Data & Analytics, Infrastructure, Research, Security.

How identity and access management is causing headaches in cloud security

Identity and access management (IAM) is seen as an important tool for determining who’s who in a nefarious cloud landscape – but organisations are struggling to get to grips with it, according to new research.

The latest Cloud Report from cloud access security broker (CASB) Netskope has revealed the majority of Center for Internet Security (CIS) benchmark violations occurring in Amazon Web Services (AWS) environments fall...

By James Bourne, 25 October 2018, 0 comments. Categories: Data & Analytics, Infrastructure, Research, Security.

Check Point Software acquires Dome9 to beef up multi-cloud options

Check Point Software, an Israel-based cyber security firm, has announced the acquisition of compatriot Dome9 – with multi-cloud capability once again proving key.

Dome9, which like Check Point is based in Tel Aviv, offers a SaaS platform which aims to visualise organisations’ security postures in the public cloud. Companies can have verifiable infrastructure security for every public cloud, including the behemoths of AWS, Azure and...

By James Bourne, 24 October 2018, 0 comments. Categories: Data Management, Security.

Understanding the cloud security conundrum: What is the answer?

Name an online cloud storage service provider and you’ll have no problem at all finding reports for a breach. Recently, we’ve seen frequent incidents reported in the press involving companies leaking data through misconfigurations involving the cloud, as well as headlines reporting on user inexperience leading to weak security in cloud deployments.

But user error, complexity and misconfiguration surrounding cloud...

By Evtim Batchev, 19 October 2018, 0 comments. Categories: Data & Analytics, Infrastructure, Security.

Amid various privacy scares – yes, you can collaborate and communicate securely in the cloud

Last week, Facebook announced the launch of Portal, a voice-activated smart home camera device. Considering the recent data breach the company suffered, the tech press response to Portal ranged from bafflement to incredulity.

In response, Facebook senior exec Andrew Bosworth insisted< all processing was done locally on the device – so no information was uploaded to the cloud, or stored on Facebook servers. But is this sensible policy...

By John Mason, 19 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Putting the ‘ops’ back in DevOps: Keeping relevant and providing value for IT

DevOps is the new normal for rapidly delivering high quality software and, with software as the new face of business, speed and quality can determine success. However, integrating DevOps into your organisation can take some getting used to.

Despite initial challenges, the end result has a huge upside. Once DevOps is embraced and established, continuous testing and continuous release will enable you to confidently provide more...

By Bill Talbot, 18 October 2018, 0 comments. Categories: Developers, DevOps, Infrastructure, Security.

Digital trust: Why enterprise IT compliance matters

Do you wonder, are there significant benefits for building a culture of digital trust? New research has uncovered a direct connection between the cause and effect of bad actors in organisations across the globe. Information technology has many uses, but business leaders must be mindful of compliance.

Twenty-nine percent of employees observed at least one compliance violation at work in 2016 or 2017, according to the latest worldwide market study by Gartner. The survey, which sampled more than 5,000 employees...

By David H Deans, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Enterprise, Security.

Simplifying complex public sector environments through cloud: A guide

Government and public sector organisations continue to seek ways to improve services and mitigate the risk of migrating mission-critical applications to the cloud. Already, many organisations, focused on improving the citizen experience, have set their sights on the cloud. Flexible, agile and affordable, managed cloud can accelerate the agency mission.  Still, CIOs are cautious about which applications to prioritise and what steps they must take to ensure the reality fulfils the promise.

In the US, since...

By Roberto Mircoli, 11 October 2018, 0 comments. Categories: Infrastructure, PublicSector, Security.

How identities are the new security perimeter

  • Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee.
  • 18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
  • Apple employees in Ireland have been offered as much as €20,000 ($22,878) in exchange for their privilege access credentials in 2016, according to 

By Louis Columbus, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Security, Vulnerabilities.

The importance of APIs in public cloud security: How secure do you think yours are?

The use of the cloud is now mainstream and, despite some concerns, it is generally accepted that the public cloud is not inherently insecure. In fact, in many cases it is more secure than most data centres.

This can be explained when we consider how many opportunities there are for a piece of sensitive information that...

By Jason Macy, 01 October 2018, 0 comments. Categories: Architecture, Developers, Platform, Security, Vulnerabilities.

Five Kubernetes role-based access control mistakes to avoid

If you run workloads in Kubernetes, you know how much important data is accessible through the Kubernetes API—from details of deployments to persistent storage configurations to secrets. The Kubernetes community has delivered a number of impactful security features in 2017 and 2018, including Role-Based Access Control (RBAC) for the Kubernetes API.

RBAC is a key security feature that protects your cluster by allowing you to control who can access specific API resources. Because the feature is relatively...

By Kaizhe Huang, 26 September 2018, 0 comments. Categories: Containers, Data & Analytics, Data Management, Developers, Security.

Cloud security and small businesses – what you need to know to avoid the pitfalls

Today we work in a world that is increasingly connected, convenient and cloud-based. This comes with a world of benefits not just for enterprises, but also for small to medium sized businesses (SMBs).

It’s now easier than ever to share documents in the cloud, video-conference with colleagues across the world and compile resources so that global teams can quickly access them from shared storage. The downfall,...

By Dirk Morris, 21 September 2018, 1 comment. Categories: Infrastructure, Security, Software, Vulnerabilities.

How the Cloud Security Alliance Cloud Controls Matrix benefits financial institutions

The self-service and dynamic nature of cloud infrastructure creates challenges for risk and compliance professionals. Tools that worked well in the traditional data centre do not translate to the public cloud.  

Due to these concerns over regulatory compliance and security, as well as the complexity involved in replacing legacy systems, financial institutions are taking a more...

By Brian Johnson, 14 September 2018, 0 comments. Categories: Compliance, Data & Analytics, Industry, Security.

Why healthcare providers need Zero Trust Security to boost their digital initiatives

  • 58% of healthcare systems breach attempts involve inside actors, which makes this the leading industry for insider threats today.
  • Ransomware leads all malicious code categories, responsible for 70% of breach attempt incidents.
  • Stealing laptops from medical professionals’ cars to obtain privileged access credentials to gain access and install malware on healthcare networks, exfiltrate valuable data or sabotage systems and applications are all common breach strategies.

These and many other fascinating insights are from 

By Louis Columbus, 11 September 2018, 0 comments. Categories: Applications, Best Practice, Data & Analytics, Data Management, Security.

Tresorit raises €11.5 million in series B funding to help promote secure cloud collaboration

Tresorit, a European provider of cloud security and collaboration software, has announced it has raised €11.5 million (£10.4m) in series B funding to help accelerate growth and scale marketing and sales operations.

The company, which sits in the enterprise file and sync space, offers products focused at the legal, healthcare and HR departments around encrypted storage and secure file sharing, as well as...

By James Bourne, 04 September 2018, 0 comments. Categories: Collaboration, Compliance, Security, Software.