Samsung Heavy Industries chooses AWS to help take shipbuilding into the cloud

Another example of cloud computing infiltrating key enterprises; shipbuilding firm Samsung Heavy Industries is moving to Amazon Web Services (AWS) as its preferred cloud provider.

The company says it wants to be seen as a ‘cloud-first maritime business’, with Samsung using a variety of AWS’ services. These include EC2 and S3, naturally, alongside Amazon’s relational database, RDS, AWS Key Management, and governance and compliance tool CloudTrail.

By putting sensors in a variety of devices and...

By James Bourne, 09 August 2018, 0 comments. Categories: Compliance, Enterprise, Infrastructure, Security.

Hammering home public cloud shared security obligations: The importance of education

Public cloud customers need to become clearer on what their responsibility is for securing their data and applications hosted by public cloud providers. I believe there is a misunderstanding on how much responsibility the likes of AWS, Azure, and Google Cloud Platform have for securing their customers. Their platforms are definitely secure and migrating workloads into the cloud can be much more secure than on premise data centers, however organisations do have a responsibility in securing their workloads...

By Hatem Naguib, 07 August 2018, 0 comments. Categories: Infrastructure, Public, Security.

Cisco to acquire Duo Security to beef up multi-cloud efforts

Here’s a good example of how security underlines – or should underline – pretty much everything in the cloud: Cisco has announced it is to acquire Michigan-based Duo Security for upwards of $2.3 billion (£1.8bn).

The deal, which expects to close during the first quarter of Cisco’s fiscal year 2019, aims to help give the networking giant’s customers straightforward and secure access to any application on any networked device through Duo’s platform.

Duo Security offers...

By James Bourne, 06 August 2018, 0 comments. Categories: M&A, Platform, Security.

The security slowdown: How to maximise cloud performance while keeping your data safe

Organisations are moving to public cloud infrastructures to do business faster with more customers. With the increase in traffic, though, comes a need for more inspection capacity that could potentially slow things down in the name of keeping data safe. Because performance is a baseline requirement for competing in the digital marketplace, security cannot be a bottleneck.

But how can you scale security performance to meet the growing performance demands of today’s cloud environments? You may think your...

By Matt Pley, 02 August 2018, 0 comments. Categories: Data & Analytics, Infrastructure, Security.

Why the cloud is key to mitigating the menace of phishing

After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back onto the IT security manager’s radar.

According to our latest survey on IT security in the UK and Ireland, phishing is now the second most pressing cyber security issue after data breaches. The survey of 104 IT and security managers found that the majority of...

By Lior Samuelson, 26 July 2018, 0 comments. Categories: Best Practice, Data & Analytics, Hacking, Security.

Alert Logic takes aim at container security problems with latest offering

If your organisation has been considering containers, then security concerns will almost certainly be paramount. Alert Logic, an information security provider, thinks it may have the answer.

The company has launched what is claimed to be the industry’s first intrusion detection system for containers which aims to ‘bring organisations powerful new capabilities to inspect network traffic for malicious activity targeting containers’, in the company’s words.

As Alert Logic is an AWS...

By James Bourne, 23 July 2018, 0 comments. Categories: Containers, Infrastructure, Microservices, Platform, Security.

Assessing just how safe you are in the cloud – and three tips to secure your business data

Each day, Internet users generate an average of 2.5 quintillion bytes of data, according to recent research from Domo. Per minute, The Weather Channel receives more than 18 million forecast requests, Netflix users stream almost 70,000 hours of video, and Google conducts 3.5 million searches.

90% of all data available today was created in the last two years. As a result, an ever-increasing amount of enterprise data is being stored in the public cloud, both exclusively and hybrid. But it seems not everything is...

By Pratik Dholakiya, 20 July 2018, 1 comment. Categories: Data & Analytics, Data Management, Security.

The data centre of tomorrow: How the cloud impacts on data centre architectures

As the enterprise world continues speeding towards complete digitization, technologies like cloud and multi-cloud are leading the charge. Yes, cloud offerings like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud are changing the way enterprises consume IT resources. Having cloud-grade infrastructure at an enterprise’s fingertips opens up opportunities that simply did not exist before.

But are the effects of cloud limited to a collection of somewhat ephemeral infrastructure residing in...

By Mike Bushong, 19 July 2018, 1 comment. Categories: Data Centres, Infrastructure, Security.

The perils of not having disaster recovery - or, why we love a good reserve parachute

One of the most important but often missed steps in having a reliable infrastructure is disaster recovery (DR). Surprisingly, most companies decide either to not implement DR or to implement it halfway. Here, I intend to explore common terms and understandings in disaster recovery; how to leverage the cloud, different types, the plan and important considerations, as well as the economic impact.

Regional vs. zone/domain DR

DR can be implemented at regional or zone/domain level, depending on needs. I advocate...

By Nazareno Feito, 18 July 2018, 0 comments. Categories: Disaster Recovery, Infrastructure, Security.

Netskope acquires Sift Security for next generation IaaS tools

Netskope is looking to the next generation of cloud security with the acquisition of Sift Security.

The acquisition, which closed in June, will see Sift's infrastructure as a service (IaaS) breach detection and visualisation tool Cloud Hunter move into Netskope's Security Cloud offering.

"By bringing Sift Security into our 'one cloud' architecture, we will take Netskope for IaaS (and as a result, the entire Netskope Security Cloud) to a new level," wrote Sanjay Beri, Netskope CEO,

By James Bourne, 16 July 2018, 0 comments. Categories: IaaS, Infrastructure, M&A, Security.

How cryptomining is the attack vector du jour - as hackers increasingly target cloud infrastructure

Updated July 30 Cryptojacking is on the way to replacing ransomware as the biggest threat for consumers and enterprises - and new research reveals the size of the effect crypto is having on cloud infrastructures.

Cyber security firm Check Point Software, in its 'Cyber Attack Trends: 2018 Mid-Year Report', found that in the first half of this year, the number of organisations impacted by cryptomining malware doubled to 42%, compared with 20.5% from the second half...

By James Bourne, 16 July 2018, 0 comments. Categories: Blockchain, Infrastructure, Security, Vulnerabilities.

Why enterprises feel more susceptible to threats than ever before

  • Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords.
  • 53% of enterprises feel they are more susceptible to threats since 2015.
  • 51% of enterprises suffered at least one breach in the past 12 months and malicious insider incidents increased 11% year-over-year.

These and many other fascinating insights are from SecurIT: the Zero Trust Summit for CIOs and CISOs held last month in San Francisco, CA.

By Louis Columbus, 13 July 2018, 0 comments. Categories: Data Management, Enterprise, Infrastructure, Security, Vulnerabilities.

Majority of organisations favouring multi-cloud strategies, Virtustream argues

Multi-cloud is here to stay, that much we already know – but the sheer extent of its growth is helping enterprises move mission-critical applications to the cloud.

That is the key finding from a new report by cloud technology provider Virtustream. The study, titled ‘Multi-cloud Arises from Changing Cloud Priorities’ and conducted alongside Forrester, found the vast majority (86%) of respondents see their current cloud strategy as multi-cloud. What’s more, 60% of enterprises polled said...

By James Bourne, 13 July 2018, 0 comments. Categories: Compliance, Infrastructure, Research, Security.

How to get the right kind of control over your cloud: A guide

Trust in the cloud hasn’t always been universal. There was a time when security and risk management leaders feared entrusting critical data and infrastructure to a third-party cloud provider. This was understandable, arising from the history of network management, where IT teams were intimately familiar with managing the resources that made up their IT infrastructures, from the buildings they were housed in, to the electricity and cooling supply, through to the server, all the way down to the storage...

By Monica Brink, 11 July 2018, 0 comments. Categories: Collaboration, Data & Analytics, Data Management, Security, Software.

SolarWinds acquires Trusted Metrics to add real-time threat monitoring to cloud security mix

SolarWinds is on the acquisition trail again – this time confirming the acquisition of Trusted Metrics, a real-time threat monitoring and management software provider.

The acquisition will enable SolarWinds to release a new security product under the name of SolarWinds Threat Monitor, which is an automated tool which aims to make threat detection easier for IT operations teams, managed service providers and managed security service providers.

As regular readers of this publication will testify, organisations’ cloud...

By James Bourne, 11 July 2018, 0 comments. Categories: Data & Analytics, M&A, Security, Vulnerabilities.

New study notes network trouble organisations face amid strong public cloud adoption

Public cloud adoption will continue to go up and up – but as hybrid initiatives go up with them, concerns persist over how to handle cloud migration challenges.

That’s the key finding from the latest study by VIAVI Solutions. The IT and network testing provider, in its most recent State of the Network Global Study, polled more than 600 IT professionals and found more than half (56%) of enterprises polled had made the leap to public cloud as of this year. This number is set to go up to 72% by...

By James Bourne, 10 July 2018, 0 comments. Categories: Adoption, Infrastructure, Research, Security.

Three unbeatable security advantages of cloud-based solutions for your business

Cloud-based solutions have never been more popular than ever. Proponents and opponents have their reasons to keep debates fuelled, but small to mid-sized businesses shouldn’t ignore the security benefits cloud can offer.

Higher standards

Implementing cloud-based solutions for your business is certain to bring a higher standard of security that your in-house IT team or a locally managed system is unlikely to achieve.

Multi-factor authentication: Small to medium-sized businesses don’t have...

By Jeff Dennis, 25 June 2018, 0 comments. Categories: Data & Analytics, Data Management, Security, Vulnerabilities.

Why for ultimate data centre security, technology alone is not the answer

The security of data – and in particular people’s personal data – has been a hot topic in recent months. The EU’s rollout of new GDPR regulations; the Cambridge Analytica scandal; or the seemingly weekly revelations of financial institutions or consumer service providers which have had their databases hacked, are all examples most of us will be aware of.

Less often discussed but just as important as the security of our data, is the security of the data centres that house it. And at...

By Arturo Maqueo, 21 June 2018, 0 comments. Categories: Data Centres, Infrastructure, Security, Vulnerabilities.

Kubernetes skills demand continues to soar – but are organisations dropping the ball on security?

If you have Kubernetes skills then you will almost certainly be in demand from employers, as a new survey from CyberArk has found that IT jobs with the container orchestration tool in the title have soared year on year. But beware the security risks when getting involved.

According to the company, which has crunched data from IT Jobs Watch, roles involving Kubernetes have broken into the top 250 most popular IT vacancies, having been around the 1000 mark this time last year. The most likely job title for...

Google Cloud launches sole-tenant nodes for improved compliance and utilisation

Google Cloud has announced the launch of sole-tenant nodes on Google Compute Engine – helping customers in various industries around compliance in the process.

The new service, which is currently in beta availability, gives customers ownership of all VMs, hypervisor and host hardware, going against the traditional cloud use case of multi-tenant architecture and shared resources.

“Normally, VM instances run on physical hosts that may be shared by many customers,” explained Google’s Manish Dalwadi and...

By James Bourne, 08 June 2018, 0 comments. Categories: Applications, Architecture, Compliance, Google, Infrastructure, Security.