It's not you, it's me: How IT can stop the mobility-cloud break up

Enterprises see a lot of promise in mobile devices. Their users should be more productive now that they can craft presentations on the go. Their employees should have more opportunities to collaborate now that they can share documents anytime via their smartphones. Right?

Well, not really. For too many businesses, the promise of the bring-your-own-device (BYOD) trend has been swallowed up by mobile workflow challenges and insecure, consumer-grade cloud sharing solutions.

It would be easy to predict the...

By Moti Rafalin, 24 May 2013, 1 comment. Categories: Enterprise, Mobility, Security.

7 causes of security paralysis and cloud-based cures

Over and over again we are pummeled with statistics on how risk is growing in disproportion to security readiness.

-91% of companies have experienced at least one IT security event from an external source.

-90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders.

-40% reported rogue cloud issues (shadow IT) experienced the exposure of confidential information as a result

-34% share passwords with their co-workers for applications like FedEx, Twitter, Staples,...

By Cloud Security, 23 May 2013, 0 comments. Categories: Adoption, Best Practice, Security.

Google plays its IaaS hand with Compute Engine general release

Among the hive of activity at Google I/O, one of the search giant’s more interesting announcements has come in the form of a general preview release of Google Compute Engine (GCE), giving developers increased access to Google infrastructure.

Google’s latest push is a further move into the infrastructure as a service (IaaS) space, and culminates in the Silicon Valley company finding itself jockeying for position in a three horse race alongside Amazon and Microsoft.

By James Bourne, 21 May 2013, 0 comments. Categories: Developers, IaaS, Security.

Hybrid cloud “wave of the future” for seven out of 10 IT pros

Another day, another cloud survey, and for 69% of the near 250 IT professionals quizzed by business process automation firm PMG, the hybrid cloud is the “wave of the future within their organisations”.

The combination of public and private cloud is really starting to gain traction in 2013. But why?

The most important reason for adopting hybrid clouds, according to 38% of respondents, was that cloud apps were deployed faster. Delivering better value (21%), and being able to meet requirements more...

By James Bourne, 09 May 2013, 0 comments. Categories: Hybrid, Private, Public, Research, Security.

Kim Dotcom fights back at US government in new whitepaper

After a raid at his New Zealand mansion in January last year, the larger than life Kim Dotcom has released a whitepaper taking direct aim at the US government.

The paper goes into detail how the raid wasn’t enough for “The Government Communications Security Bureau” who continued to illegally spy on Kim Dotcom for ten days after the raid on his home, according to his lawyers.

These very lawyers, US lawyer...

By Ryan Daws, 08 May 2013, 0 comments. Categories: Compliance, Government, Security.

Brass tacks: Answering the security questions that matter

Enterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives.

But when we get down to the nitty gritty (the brass tacks if you will), security can be simplified by six simple questions:

WHO is logging in?

WHAT are they accessing/viewing?

WHERE is the device from which that person logs in?

WHEN was any asset changed/modified/moved

HOW are they authorised/credentialed?

WHAT is the impact of the event?

Now determining the answers to those questions might require a bit of...

By Cloud Security, 23 April 2013, 0 comments. Categories: Architecture, Enterprise, Infrastructure, Security.

Proactive security is required in highly regulated industries

Andrew Kellett, Principal Analyst, Infrastructure and SecurityMaintaining security that meets the risk and compliance requirements of the enterprise is a constant challenge. Systems and networks are becoming more open and accessible, but at the same time, threats have become more advanced, persistent, and complex. This is a particularly important issue in highly regulated markets such as financial services, where failure to protect sensitive information will have a negative effect on the business and how it is...

By Ovum StraightTalk, 22 April 2013, 0 comments. Categories: Architecture, Data & Analytics, Enterprise, Hacking, Infrastructure, Security.

Cloud security: From hacking the mainframe to protecting identity

By Andi Mann, Vice President, Strategic Solutions at CA

Cloud computing, mobility, and the Internet of Things are leading us towards a more technology-driven world. In my last blog, I wrote about how the Internet of Things will change our everyday lives, but with these new technologies comes new risks to the organization.

To understand how recent trends are shifting security, let’s revisit the golden age of

By GreenPages Technology Solutions, 12 April 2013, 0 comments. Categories: Hacking, Security.

Private cloud drives data centre expansion, says survey

Half of those polled in the latest cloudy survey have said they will “definitely” look to expand their data centres in the coming year, with the vast majority of remaining respondents claiming they will expand in 2014.

The survey, commissioned by data centre services provider Digital Realty Trust and conducted by Campos Research and Analysis, spoke to 300 IT execs and concluded that this explosion in data centre usage was primarily down to the proliferation...

By James Bourne, 10 April 2013, 0 comments. Categories: Big Data, Private, Security.

Fears of cloud insecurity “should not drive infrastructure decisions”

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

By James Bourne, 27 March 2013, 0 comments. Categories: Hacking, Infrastructure, Research, Security.

Is BYOD the cloud evangelist’s worst nightmare?

For three in four IT security professionals, bring your own device (BYOD) is one of the “greatest inhibitors to effective cloud security”.

That’s the result from a new report by AccelOps. Talking to 176 IT security personnel, the results put BYOD ahead of data control and data loss – traditional topics for cloud security worriers – as the main security threat.

Other cloud security pain points according to the research included enforcing security policies, compliance reporting and employee...

By James Bourne, 22 March 2013, 0 comments. Categories: Applications, Enterprise, Security.

Vapour vs bricks: Why the cloud could be the safest place for your data

By Justin Fielder, Easynet Chief Technology Officer

If I was to suggest businesses move IT services to the cloud to improve security, there’s a strong possibility I would be laughed out of town. Despite businesses clearly seeing the benefits of migrating to the cloud, research shows that, for 61% of European CIOs, security is still the biggest concern when considering such a move.

For many network professionals, there is a clear comfort factor which derives from having a virtual boundary fence built...

By Easynet G.S., 21 March 2013, 1 comment. Categories: Big Data, Disaster Recovery, Enterprise, Security.

Who’s the number one cloud computing nation?

The BSA has put together a report which ranks the top 20 countries worldwide in terms of cloud readiness, and it may not be a surprise as to which nation is at the summit...

Japan is the highest ranked cloud computing nation worldwide, according to research published by BSA: Software Alliance.

In its 2013 BSA Global Cloud Computing Scorecard, the Alliance aims to “provide a platform for discussion between policymakers and providers of cloud offerings, with a view toward developing an internationally...

By James Bourne, 20 March 2013, 1 comment. Categories: Industry, Research, Security, Trends.

Soto: “Cloud does not absolve anyone from common sense IT”

CloudTech speaks with Juan Carlos Soto, Informatica senior vice president, cloud evangelist and member of the TechAmerica Foundation’s US Deployment of the Cloud, about iPaaS, SLAs and keeping secure in the cloud.

The difficulties around cloud security may be improving, but users don’t help themselves if they’re not street smart about their IT usage.

That’s according to Informatica senior vice president Juan Carlos Soto, who said that cloud computing shouldn’t “absolve...

By James Bourne, 15 March 2013, 0 comments. Categories: Big Data, PaaS, Security, SLA.

The death of the enterprise boundary and the evolution of edge security

Across the globe, organisations in all industries are facing the increasingly complex job to control the security and privacy of their data – wherever, however and whenever it is accessed. In one way or another, this has always been a challenge for enterprises.

However, as big data, cloud services, mobile tech and social networks converge in the enterprise space, organisations today are under greater pressure than ever before to keep up with the impact this is having on security.

Staying on top of changing...

By John Thielens, 15 March 2013, 0 comments. Categories: Big Data, Enterprise, Security.

3 reasons to embrace the private cloud

For everything cloud computing offers – speed, convenience, simplicity, offsite backups – its “public” nature remains a touchy subject for enterprise.

This simple fact explains why many organisations have been slow to embrace the cloud. In business, data security is everything. And for decision makers at big firms, trusting all mission-critical data into the care of a third-party IT vendor sounds just a bit too risky.

But with the arrival of the private cloud, organizations can enjoy...

By Aidan Grayson, 08 March 2013, 0 comments. Categories: Big Data, Enterprise, Private, SaaS , Security.

10 things to think about when moving to the cloud

Moving applications to the cloud can create a more flexible, more responsive IT department, but what about moving application data to the cloud? How secure is that? And are cloud applications truly reliable and less expensive than on-premise applications?

Let’s consider some issues before you take the cloud-migration leap.

1. Goals Are you moving to the cloud to reduce costs, time-to-deployment, or your IT department’s workload? Goals are the foundation of success, so you should...

By Paul Moxon, 07 March 2013, 1 comment. Categories: Disaster Recovery, Monitoring, Security.

CSA: What are 2013’s top cloud security threats?

The Cloud Security Alliance (CSA) has released a new report designed to examine the most pervasive security threats still threatening cloud in 2013.

Called “The Notorious Nine” – presumably using the same nomenclature that Enid Blyton employed for the protagonists of her fabled children’s books – the CSA enlisted the help of industry experts, and is designed to be used in conjunction with other CSA best practice guides; “Security Guidance for Critical Areas in Cloud...

By James Bourne, 04 March 2013, 0 comments. Categories: Best Practice, Big Data, Disaster Recovery, Security.