The rise of obfuscated VPN servers and their use cases: A guide

VPNs continue to be used extensively as tools to protect data security and user privacy. Yet, as to be expected, there are many providers available, and many options within those providers – so buyer confusion can reign.

A virtual private network, by itself, is the secure, private connection between your device and your intended destination. When dealing with

By Christopher Nichols, 24 October 2019, 0 comments. Categories: Privacy, Security, Software, Virtualisation.

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data protection provider Virtru has...

By James Bourne, 19 February 2019, 0 comments. Categories: Data & Analytics, Data Loss, Privacy, Research, Security.

Predicting the future of next-gen access and Zero Trust Security in 2019: Challenges ahead

Bottom line:  The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security (ZTS) strategy based on Next-Gen Access (NGA) that scales to protect every access point to corporate data, recognising that identities are the new security perimeter.

The faster any digital business is growing, the more identities, devices and network endpoints proliferate. The most successful businesses of 2019 and beyond are actively creating entirely new digital business models today....

By Louis Columbus, 22 January 2019, 0 comments. Categories: Data & Analytics, Privacy, Security, Vulnerabilities.

For better or for worse: Why your brand reputation is hitched to your ability to manage and protect data

The potential benefits of technology to change and improve lives are clear for all to see. At an individual level, wearable devices can help better manage health, home sensors can reduce your energy use and costs, and analytics can hone services to meet your every need. At an organisational level, digital transformation can not only boost efficiency and productivity, but it can change the way that whole industries operate and allow organisations (including...

By Bill Mew, 01 November 2018, 0 comments. Categories: Data & Analytics, Data Management, Privacy.

Amid various privacy scares – yes, you can collaborate and communicate securely in the cloud

Last week, Facebook announced the launch of Portal, a voice-activated smart home camera device. Considering the recent data breach the company suffered, the tech press response to Portal ranged from bafflement to incredulity.

In response, Facebook senior exec Andrew Bosworth insisted< all processing was done locally on the device – so no information was uploaded to the cloud, or stored on Facebook servers. But is this sensible policy...

By John Mason, 19 October 2018, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

WikiLeaks claims to publish confidential AWS data centre location information

WikiLeaks has published what it claims is a 'highly confidential' document outlining the addresses and operational details of Amazon Web Services (AWS) data centres.

The whistle-blowing organisation claims to have published the document, originating from late 2015, as an attempt to shed light on the 'largely hidden' nature of cloud infrastructure locations.

"While one of the benefits of the cloud is the potential to increase reliability through geographic distribution of computing...

By James Bourne, 15 October 2018, 0 comments. Categories: Amazon, Data Centres, Data Management, Data Sovereignty, Infrastructure, Privacy.

Keeping secrets: Tips for protecting your data in AWS S3

Amazon Web Services is the juggernaut in the cloud provider space, and with any piece of technology comes the need for proper security. In this regard, AWS is no exception. In this piece, we will shortly discuss the latest breaches of public S3 buckets, provide an overview of the two ways to protect data in these storage spaces, and discuss how the new Amazon Secrets Manager utility can assist in securing AWS cloud applications.

Recent breaches

There have been a couple of recent instances in which company S3 buckets have been read by...

By Doug Hazelman, 23 April 2018, 0 comments. Categories: Amazon, Privacy, Public, Security, Software, Storage.

Why trust and transparency are key for companies complying with new EBA cloud guidance

New guidance from official regulators should be music to the ears of anyone involved in compliance. Clarification, reference points and approved examples make the business of compliance that much more straightforward and are generally welcomed by compliance experts. In that spirit, it was with the best intentions - to clear the pathway to cloud adoption for financial services companies - that the European...

By Frank Krieger, 13 April 2018, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Privacy, Security.

The key aspects to consider when executing a smooth move to the cloud

As the benefits of cloud computing become more pronounced, more businesses are migrating to the cloud. Greater scalability, flexibility and financial security often come as a result of making the shift to cloud computing - and those are just a few of the advantages. The allure of the cloud is well known. However, the fine details of cloud migration and implementation are often overlooked.

Migrating to the cloud is more

By Rick Delgado, 24 March 2017, 0 comments. Categories: Adoption, Data & Analytics, Infrastructure, Migration, Privacy.

Why it’s time to take new strategies for beating ransomware

(c)iStock.com/Leonardo Patrizi

The sad facts of ransomware are that no-one is immune and attacks are impacting hospitals, schools, government, law enforcement agencies and businesses of all sizes. The increased frequency – and scale – of attacks has organisations thinking differently about their approach to ransomware. According to the FBI, ransomware attacks have increased 35-fold in 2016, resulting in an estimated $209 million paid out every quarter.

In addition, there has recently been a string...

By Jeff Denworth, 26 October 2016, 0 comments. Categories: Privacy, Security, Vulnerabilities.

Microsoft launches cloud services due diligence checklist

(c)iStock.com/cruphoto

Microsoft has launched a cloud services due diligence checklist aimed at providing organisations with more standardised procedures for their potential cloud push.

The checklist is based on the emerging ISO/IEC 19086 standard which focuses on cloud service level agreements, and gives structure to organisations of all sizes and sectors to identify their objectives and requirements, before comparing the offerings of different cloud service providers.

“Cloud adoption is no longer simply a...

By James Bourne, 17 October 2016, 1 comment. Categories: Microsoft, Privacy, Security, SLA.

Two in three CIOs yet to formulate ‘comprehensive’ GDPR strategy

(c)iStock.com/Leonardo Patrizi

Businesses have been warned and they’ve been previously shown up for not having the required knowledge over the European Union General Data Protection Regulation (GDPR) – now, a new piece of research from mainframe firm Compuware argues that more than two thirds of...

By James Bourne, 13 September 2016, 0 comments. Categories: CIO, Data & Analytics, Data Management, Data Sovereignty, Europe, Privacy.

Why vendor lock-in remains a big roadblock to cloud success

(c)iStock.com/LeoWolfert

Despite the clear advantages of cloud, enterprises can be skittish about getting “trapped” in a public cloud vendor. But unfortunately, this may prevent them from achieving success in the cloud, a new survey finds.

According to a Logicworks survey by Wakefield Research, 78% of IT decision makers believe that concerns about vendor lock-in prevent their organisation from maximising the benefits of cloud resources. This...

By Logicworks, 01 September 2016, 1 comment. Categories: Privacy, Security, Vendors.

Microsoft research aims to better utilise encrypted cloud data without privacy fears

(c)iStock.com/maxkabakov

In some instances, encryption is a double-edged sword: if data is encrypted in the cloud, it’s secure, but you can’t get access to it. Yet a new research paper presented by Microsoft may be the first step to changing it.

The paper examines the concept of secure data exchange (SDE), where the aim, as a blog post from Microsoft Research writer John Roach puts it, is to...

By James Bourne, 10 August 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Lack of encryption for sensitive cloud data worrying for businesses, argues Gemalto

(c)iStock.com/Jirsak

Though cloud-based resources are becoming increasingly important to companies’ IT operations and business strategies, only a third of sensitive cloudy data is encrypted, according to the latest research from digital security provider Gemalto.

The findings, conducted in association with the Ponemon Institute, found more than nine in 10 UK firms (92%) don’t encrypt more than three quarters of their sensitive data sent via the cloud, while almost four in 10 (39%) do not encrypt...

By James Bourne, 28 July 2016, 0 comments. Categories: Adoption, Privacy, Security.

IT skills shortage leading to cybersecurity issues, research argues

(c)iStock.com/maxkabakov

If a security system flags up an issue in your organisation and nobody acts on it, is it even an issue? Many organisations are acting that way, according to a report from Skyhigh Networks and the Cloud Security Alliance (CSA).

The research found that security budgets continue to rise – more than half (53%) of the 220 IT and security professionals polled expect their allocations to go up in the coming year – and the myriad of tools at teams’ disposals is a growing...

By James Bourne, 28 June 2016, 0 comments. Categories: Data Management, Data Sovereignty, Privacy, Security.

Data sovereignty: How to shield your business from changing regulations

(c)iStock.com/Tempura

International data privacy regulations can be complex and ever-changing. The invalidation of the Safe Harbour agreement by the European Court of Justice, and the ongoing negotiations about its replacement, means than many companies are now forced to rethink their approach to information governance, without the certainty of knowing exactly which regulations they will need to comply with.

Classifying information that is subject to data privacy regulations, from information that is not, can...

By Gary Weiss, 25 May 2016, 0 comments. Categories: Data & Analytics, Data Management, Data Sovereignty, Infrastructure, Privacy.

Hong Kong overtakes Japan as most mature Asia Pacific cloud nation

(c)iStock.com/luxizeng

Hong Kong is the most ‘cloud-ready’ Asia Pacific nation with an overall ranking higher than that of the US and UK, according to the latest analysis from the Asia Cloud Computing Association (ACCA).

Japan, previously the leader, moved down four places to #5 in the chart with an overall score of 73.0 compared to Hong Kong’s 78.1, with the latter scoring top markets in broadband quality, privacy, and data centre risk. Singapore (76.7), New Zealand (74.4) and Australia...

By James Bourne, 28 April 2016, 2 comments. Categories: Data & Analytics, Data Management, Infrastructure, Privacy, Security.

Businesses suffering from lack of knowledge over GDPR, report finds

(c)iStock.com/BrianAJackson

The updated EU General Data Protection Regulation (GDPR) legislation is coming in the next two years – but businesses are at risk of fines because of gaps in knowledge, according to new research from Trend Micro.

More than a quarter (26%) of companies don’t know how much time they have to become compliant, according to the report which surveyed 100 senior IT decision makers in the UK. Almost one in five (18%) are not currently aware that they face fines, while a third...

By James Bourne, 26 April 2016, 0 comments. Categories: Data & Analytics, Data Management, Privacy, Security.

Organisations start to address the subtleties of securing 'as a service' propositions

(c)iStock.com/BlackJack3D

According to a recent Verizon report, 94% of companies expect more than a quarter of their workloads to be in the cloud within two years. The enterprise is moving to a cloud model of IT service consumption and delivery for a variety of reasons: IT organisations can become more responsive to business requirements by scaling up on demand, operations are refocused toward the...

By Jeff Denworth, 01 April 2016, 0 comments. Categories: Data Management, Infrastructure, Privacy, Security.