How Great Western Railway is getting its compliance on the right track

(c)iStock.com/JoeDunckley

Great Western Railway (GWR) has enlisted the help of CoreStream to provide a new system for its compliance and regulations.

Like many organisations, ensuring compliance is vital – but for GWR it may count more than others. The railway operator is governed by a franchise agreement which includes more than a thousand obligations – and failing to comply with them can result not only in fines, but also disqualification from future franchise bids.

As a result, the company...

By James Bourne, 28 September 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Skyhigh Networks grabs $40 million in series D funding in profitability push

(c)iStock.com/miki1991

Cloud security services provider Skyhigh Networks has secured $40 million (£30.9m) in a series D funding round which will aim to steer the California-based firm “through to profitability.”

The round was led by Thomset Ventures, with Sequoia Capital and Greylock Partners also contributing. Total venture capital to Skyhigh, launched only in February 2013, is now at $105.5m.

Skyhigh’s proposition is through being a leading ‘cloud access security broker’...

By James Bourne, 26 September 2016, 0 comments. Categories: Economy, M&A, Security.

Cloud usage in healthcare on the up, new research argues

(c)iStock.com/deepblue4you

More than half of respondents in a survey from cloud migration services provider SADA Systems say cloud-based apps are improving patient satisfaction and leading to better treatment.

The survey, which polled more than 300 North American IT professionals, found Microsoft was the primary cloud infrastructure platform for healthcare organisations, cited by 42% of respondents. Google (29%) and Amazon (27%) trailed behind. In terms of mobile device management, Microsoft (55% of...

By James Bourne, 23 September 2016, 0 comments. Categories: Adoption, Applications, Industry, Security, Software.

Research argues overconfidence in disaster recovery is ‘common and costly’

(c)iStock.com/roberthyrons

A new UK study from cloud disaster recovery provider iland has found that 95% of respondents have faced an outage or data loss in the past year – with 87% of that number saying it triggered a failover.

The survey, conducted by Opinion Matters and which specifically polled 250 UK decision makers responsible for their company’s IT disaster recovery plans, also found that of the 87% who had executed a failover, while 82% said they were confident it would be successful, 55%...

By James Bourne, 22 September 2016, 0 comments. Categories: Data Loss, Data Management, Disaster Recovery, Security.

Netskope research shows how cloud malware and ransomware remain issues

(c)iStock.com/DundStock

According to the latest research from cloud security provider Netskope, almost 44% of malware found in cloud apps have delivered ransomware, while almost 56% of malware-infected files in cloud apps are shared publicly.

The study, which appears in the company’s latest Netskope Cloud Report, found that the number of cloud apps keep going up in enterprises; 824 on average, up from 777 during the last quarter. Microsoft continues to beat Google as the most popular cloud app, with...

By James Bourne, 08 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.

Why vendor lock-in remains a big roadblock to cloud success

(c)iStock.com/LeoWolfert

Despite the clear advantages of cloud, enterprises can be skittish about getting “trapped” in a public cloud vendor. But unfortunately, this may prevent them from achieving success in the cloud, a new survey finds.

According to a Logicworks survey by Wakefield Research, 78% of IT decision makers believe that concerns about vendor lock-in prevent their organisation from maximising the benefits of cloud resources. This...

By Logicworks, 01 September 2016, 1 comment. Categories: Privacy, Security, Vendors.

Dropbox says password reset measures have worked following leak revelations

(c)iStock.com/KIVILCIM PINAR

Cloud storage provider Dropbox has said the password reset measures the company put in place has prevented any hacking of user data, following revelations made in stories which argued that millions of account details had been accessed.

Certain Dropbox users received an email from the cloud storage provider earlier this week advising that if their account password was the same as before mid-2012, they will be prompted to change it the next time they sign in.

A blog post at the time from Patrick...

By James Bourne, 31 August 2016, 0 comments. Categories: Data Management, Security, Software, Storage, Vulnerabilities.

The top 100 best practices in big data – revealed

(c)iStock.com/ismagilov

The Cloud Security Alliance (CSA) has today released a mammoth document detailing the 100 best practices in big data security – running the gamut from traditional cybersecurity measures to cutting edge cryptographic technologies.

The document discusses each tip at more of a cursory than comprehensive level, offering a few sentences on why and how organisations should implement them. The report goes through 10 areas with 10 tips for each, from real-time security and compliance...

By James Bourne, 26 August 2016, 1 comment. Categories: Big Data, Data & Analytics, Security, Vulnerabilities.

Encryption of cloud data is great – but it’s not a magic bullet

(c)iStock.com/BsWei

The headlong stampede of enterprise data into the cloud has passed by.

A few years ago I might have written it was ‘underway,’ but this would grossly understate the situation.  Data which was once stored on premise has left the building, the twinkling lights on the tin box in your racks are slowly blinking out. Data osmosis is taking place, draining life force from these antiquated shells into vast data-centres run by some of the largest companies on earth.   It...

By Ed Macnair, 23 August 2016, 0 comments. Categories: Big Data, Data & Analytics, Data Management, Regulation, Security.

AWS and Azure get the highest federal security rating: What happens from here?

(c)iStock.com/Kevin Smart

Cloud services have been able to store customers’ data for many years now, but the number of prospective clients for several vendors has recently dramatically increased.

Back in late June, the announcement was made that three vendors had received special certifications from the federal government, allowing them to store sensitive data that the government had...

By Rick Delgado, 18 August 2016, 0 comments. Categories: Amazon, Government, Microsoft, PublicSector, Regulation, Security.

Why security and compliance are still the main blockers to cloud adoption

(c)iStock.com/LPETTET

According to the Cloud Industry Forum, 80% of UK companies are adopting cloud technology as a key part of their overall IT and business strategy. However, one of the perceived barriers to cloud adoption continues to be concerns around security and compliance, which was the key topic of discussion at a recent techUK panel in which iland took part. During this discussion, we talked about the fact that nine out of ten security professionals worry about cloud security.

One of the key aspects that...

By Monica Brink, 16 August 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Research suggests “tactical rather than strategic” cloud adoption in ASEAN

(c)iStock.com/NickILitov

Small to medium businesses in ASEAN (Association of South East Asian Nations) are certainly on the cloud bandwagon – but it’s a stretch to say they are confident about its capabilities.

That was the overall finding from research conducted by Data & Storage Asean and commissioned by Barracuda Networks. The survey, which polled 130 IT professionals from small businesses in Indonesia, Malaysia, the Philippines and Singapore, found 73% of respondents argued their data was...

By James Bourne, 15 August 2016, 0 comments. Categories: Adoption, Infrastructure, Research, Security.

Research argues greater confidence in public cloud security from IT pros

(c)iStock.com/scanrail

IT professionals are becoming more confident in the security of the public cloud compared to corporate data centres, according to the latest study from IT consulting firm SADA Systems.

The poll, which quizzed more than 200 IT managers around their use of public cloud services, found that 84% of respondents were using some form of public cloud infrastructure today.

49% of respondents said they used Google Cloud Platform, compared with 48% for Microsoft and 42% for AWS – although...

By James Bourne, 12 August 2016, 0 comments. Categories: Data Centres, Infrastructure, Research, Security.

Examining a new approach to data centre security

(c)iStock.com/4x-Image

Changing with the times is frequently overlooked when it comes to data security. Technology is becoming increasingly dynamic, but most data centres are still using archaic security measures to protect their network – which isn’t going to stand a chance against today’s sophisticated attacks.

Recent efforts to upgrade these massive security systems are still falling short. Data centres house a huge amount of data and there shouldn’t be any shortcuts when...

By Yoav Shay Daniely, 11 August 2016, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Infrastructure, Security.

Microsoft research aims to better utilise encrypted cloud data without privacy fears

(c)iStock.com/maxkabakov

In some instances, encryption is a double-edged sword: if data is encrypted in the cloud, it’s secure, but you can’t get access to it. Yet a new research paper presented by Microsoft may be the first step to changing it.

The paper examines the concept of secure data exchange (SDE), where the aim, as a blog post from Microsoft Research writer John Roach puts it, is to...

By James Bourne, 10 August 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Google launches customer-supplied encryption keys for greater cloud security

(c)iStock.com/serg3d

Google has launched customer-supplied encryption keys (CESK) for its Compute Engine infrastructure as a service (IaaS), which enables organisations to better protect their cloudy data.

The search giant automatically encrypts customer content stored at rest, including all Compute Engine disks, but in a blog post written by Maya Kaczorowski and Eric Bahna, product managers at Google Cloud Platform, the new release is aimed to be “secure, fast and easy” for users.

“With CESK, disks at...

By James Bourne, 05 August 2016, 0 comments. Categories: Data Management, Google, IaaS, Infrastructure, Security.

Microsoft secures ISO 27017 security certification around cloud-specific threats

(c)iStock.com/Gajus

Microsoft has announced it has obtained ISO 27017 compliance, a new cloud-based security certification published at the end of last year.

The certification from the ISO, the global organisation which has published more than 21,000 international standards across a variety of industries, is newer and subsequently less known than the ISO 27018 standard, which sets out guidelines to protect personally identifiable information (PII).

Microsoft claimed to be the first adopter of ISO 27018, in

By James Bourne, 04 August 2016, 0 comments. Categories: Compliance, Microsoft, Security.

Reducing threats and management headaches across private clouds: A guide

(c)iStock.com/tzahiV

While public cloud implementations are steadily increasing, private clouds in customers’ own data centres continue to be deployed because of the perceived higher levels of security and control they offer.

But the management of a private cloud can be complex and many organisations underestimate the scale of the challenge. Security and management in particular continues to be pain points. Many go in with the assumption that in a private cloud, IT departments have more control so the environment...

By Monica Brink, 03 August 2016, 0 comments. Categories: Data & Analytics, Data Management, Security.

Why CIOs need to be strong in picking a cloud strategy – and sticking to it

(c)iStock.com/Choreograph

This time last year, Fruition Partners, an IT solutions provider, released a report which assessed the state of cloud adoption through the eyes of the CIO. The study bemoaned the rise of shadow IT and gave three best practice tips to control cloud sprawl, by focusing on the user to provide a better service, focusing on business needs, and focusing on IT strategy and how to make better use of IT service management (ITSM).

12 months on and, to quote Led Zeppelin, the song remains the same. 62% of...

By James Bourne, 01 August 2016, 1 comment. Categories: Adoption, Applications, CIO, Enterprise, Security, Software.

Lack of encryption for sensitive cloud data worrying for businesses, argues Gemalto

(c)iStock.com/Jirsak

Though cloud-based resources are becoming increasingly important to companies’ IT operations and business strategies, only a third of sensitive cloudy data is encrypted, according to the latest research from digital security provider Gemalto.

The findings, conducted in association with the Ponemon Institute, found more than nine in 10 UK firms (92%) don’t encrypt more than three quarters of their sensitive data sent via the cloud, while almost four in 10 (39%) do not encrypt...

By James Bourne, 28 July 2016, 0 comments. Categories: Adoption, Privacy, Security.