Five ways to demystify Zero Trust security – and the vendors who are pushing it

Bottom line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key.

Analytics, Zero Trust dominated RSA

Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed to have Zero Trust Security solutions at RSA, with each one defining the concept in a slightly different way.

RSA has evolved into one of the highest energy enterprise-focused...

By Louis Columbus, 25 March 2019, 0 comments. Categories: Compliance, Data & Analytics, Data Loss, Data Management, Security.

Monitoring cloud app activity for better data security: Five key tips

Digitisation has dramatically changed how work gets done. Business-critical apps and data are a keystroke away, no matter where an employee is or what time it is. Perhaps it is this familiarity with data that makes employees feel so connected to it that, when they switch jobs, they often take some of it with them. Maybe it’s why most of them don’t think this is a criminal act.

Whatever the reasoning for this...

By Mike Mason, 22 March 2019, 0 comments. Categories: Applications, Data & Analytics, Data Management, Security.

Practical cloud considerations: Security and the decryption conundrum

Compute in the cloud may be cheap but it isn't free. Most of today’s apps are delivered via secure HTTP. That means TLS or the increasingly frowned upon SSL. It means cryptography, which traditionally has been translated to mean performance problems.

Thanks to advances in technology, CPUs are now incredibly fast and many client (and...

Continuous compliance, continuous iteration: How to get through IT audits successfully

For most students, exam days are one of the most stressful experiences of their educational careers. Exams are a semi-public declaration of your ability to learn, absorb and regurgitate the curriculum, and while the rewards for passing are rather mundane, the ramifications of failure are tremendous. 

My educational experience indicates that exam success is primarily due to preparation, with a fair bit of luck. If you were like me in school, exam preparation consisted mostly of cramming, with a heavy reliance on hope that the hours spent jamming material into my brain would cover at least 70% of the exam contents.

After I left...

By Jonathan Eropkin, 15 March 2019, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Why standardisation is good for NetOps: Innovation instead of impediment

Standardisation is sometimes viewed as an assault on innovation. Being forced to abandon a polyglot buffet and adopt a more limited menu will always sound stifling. That may be because standardisation is often associated with regulatory compliance standards that have official sounding names like ISO 8076.905E and are associated with checklists, auditors and oversight committees.

By Lori MacVittie, 14 March 2019, 0 comments. Categories: Compliance, Enterprise, Platform, Regulation, Security.

Addressing cloud sprawl: Combining security best practices with business foundations

The rate of cloud adoption has been nothing short of remarkable. According to IDG, 90% of organisations will have some portion of their applications or infrastructure running in the cloud this year, with the rest expected to follow suit by 2021. And while most organisations currently run more than half (53%) of their business on traditional networks,

By Lior Cohen, 13 March 2019, 0 comments. Categories: Adoption, CIO, Data & Analytics, Infrastructure, Security.

Check Point exposes yet more shared responsibility misunderstandings for cloud security

Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cloud provider.

These and other worrying findings have appeared in Check Point’s latest study. The 2019 Security Report, of which this is the third instalment and combined...

By James Bourne, 22 February 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security.

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data protection provider Virtru has...

By James Bourne, 19 February 2019, 0 comments. Categories: Data & Analytics, Data Loss, Privacy, Research, Security.

Healthcare firms go for the hybrid cloud approach with compliance and connectivity key

It continues to be a hybrid cloud-dominated landscape – and according to new research one of the traditionally toughest industries in terms of cloud adoption is now seeing it as a priority.

A report from enterprise cloud provider Nutanix has found that in two years’ time, more than a third (37%) of healthcare organisations polled said they would deploy hybrid cloud. This represents a major increase from less than a fifth...

By James Bourne, 18 February 2019, 0 comments. Categories: Compliance, Containers, Infrastructure, Research, Security.

How to tackle the multi-cloud security challenge

A growing number of organisations are adopting a multi-cloud strategy in a bid to avoid over-reliance upon one vendor and reduce the risk of threats like DDoS attacks. This generates cost savings, yields performance optimisation, and improves up-time to ensure that operations run at all times.

Abandoning a ‘one-cloud-fits-all’ approach and using multiple services from different cloud providers delivers a raft of...

By Steve Armstrong, 11 February 2019, 0 comments. Categories: Enterprise, Infrastructure, Security.

Microsoft cites ‘layers’ of Azure and cloud depth in more positive financial results

Microsoft’s investor relations team is evidently not frightened about repeating itself when it comes to financial announcements season. “Microsoft Cloud drives record fourth quarter results,” the company proclaimed in July; “Microsoft Cloud strength powers record first quarter results,” it tooted in October; and now, “Microsoft Cloud strength fuels second quarter results.”

Given the...

By James Bourne, 31 January 2019, 0 comments. Categories: Economy, Infrastructure, Microsoft, Security.

Understanding Kubernetes today: Misconceptions, challenges and opportunities

Any discussion of Kubernetes is best started with an understanding of why we need Kubernetes. Kubernetes helps us manage containers, which dominate application development now because they enable portability, faster application development, and greater independence for developers. Once we started using containers in great volume, we needed a way to automate the setup, tear down, and management of containers - that's what Kubernetes does.

By Ali Golshan, 30 January 2019, 0 comments. Categories: Containers, Developers, Infrastructure, Kubernetes, Platform, Security.

Exploring specific security pain points with enterprise cloud adoption

While the enterprise push to public cloud continues apace, it does not hurt to hear of figures which puts the scope of the journey in perspective.

According to new figures from Ping Identity, only one in five enterprises polled said they have more than half of their IT infrastructure hosted in the public cloud. Three quarters (75%) in comparison have a hybrid approach.

Perhaps not surprisingly, the key aspect holding these organisations back is security. 43% of the 300 US-based respondents said it was the...

By James Bourne, 25 January 2019, 0 comments. Categories: Adoption, Enterprise, Security.

Do cryptographic keys belong in the cloud?

Thanks to the cloud, organisations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments. Medium-sized companies no longer have to pay to build their own infrastructure, which makes the cloud especially appealing to this market.

However, the cloud still suffers from security issues....

By Brian Jenkins, 24 January 2019, 0 comments. Categories: Data & Analytics, Security, Vulnerabilities.

Predicting the future of next-gen access and Zero Trust Security in 2019: Challenges ahead

Bottom line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognising that identities are the new security perimeter.

The faster any digital business is growing, the more identities, devices and network endpoints proliferate. The most successful businesses of 2019 and beyond are actively creating entirely new digital business models today....

By Louis Columbus, 22 January 2019, 0 comments. Categories: Data & Analytics, Privacy, Security, Vulnerabilities.

New malware strain can evade and uninstall cloud security software, researchers warn

The good news: your organisation has finally gotten around to installing some top of the range cloud security tools. The bad news: malware has been developed which can evade detection from them.

The nefarious discovery from threat actor Rocke was made by Palo Alto Networks Unit 42, with the security researchers noting that it was ‘to the best of [their] knowledge the first malware family that developed the unique capability to target and...

By James Bourne, 18 January 2019, 0 comments. Categories: Blockchain, Infrastructure, Security, Vulnerabilities.

Enterprises more confident with cloud than ever – but still concern over security issues

Another year, another study on cloud adoption – and if it’s surprising statistics you want, you’ve come to the wrong place.

Yet this may be seen as a good thing. As the report released by NetEnrich shows, the numbers on infrastructure and public cloud usage for enterprise continues to tick over, while security remains vital and DevOps still has a long way to go to mass adoption.

By James Bourne, 17 January 2019, 0 comments. Categories: Containers, DevOps, Enterprise, Infrastructure, Research, Security.

Six best practices for increasing AWS security in a Zero Trust world

  • Amazon Web Services (AWS) reported $6.6B in revenue for Q3, 2018 and $18.2B for the first three fiscal quarters of 2018.
  • AWS revenue achieved an impressive 46% year-over-year net sales growth between Q3, 2017 and Q3, 2018 and 49% year-over-year growth for the first three quarters of the year.
  • AWS’ 34% market share is bigger than its next four competitors combined with the majority of customers taken from small-to-medium sized cloud operators according to 

By Louis Columbus, 15 January 2019, 0 comments. Categories: Amazon, Compliance, Infrastructure, Security.

Cloud Security Alliance: Cloud ERP making waves but caution persists around security

Once a major headache for organisations, enterprise resource planning (ERP) systems are now becoming easier to migrate to the cloud, according to a new study from the Cloud Security Alliance (CSA).

The findings, which appear in the research firm’s latest report, titled ‘The Impact of Cloud on ERP’, surveyed almost 200 enterprise-level C-suite executives. Two thirds (64%) of organisations polled are...

By James Bourne, 14 January 2019, 0 comments. Categories: Enterprise, ERP, Research, Security, Software.

Four cloud security predictions for 2019: Containerisation, load balancers, and more

The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While many companies had previously been afraid of making the move, as the open nature of the cloud makes it less secure than on-premise solutions, new advances in cloud security have vastly reduced the number of successful attacks. With 2019...

By Stephen Dallas, 08 January 2019, 0 comments. Categories: Compliance, Containers, Enterprise, Infrastructure, Security.