Cloud providers are under attack - and sabotaged services will freeze operations

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Companies' cloud security getting better - but slowly, argues SANS Institute

Cloud security best practices are improving - but there is still a long way to go, according to a new report from SANS Institute.

The study, which polled several hundred respondents across the IT spectrum, came about, as author Dave Shackleford put it, as the result of concerning news stories around the security space. IDC found back in April that worldwide IT security spending would hit $103.1 billion by the end of...

By James Bourne, 17 May 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

Why IT security solutions spending will reach $133.8 billion

Cybersecurity investment continues to be a top priority for most IT organizations. Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019 -- that's an increase of 9.4 percent over 2018. The pace of growth will continue as industries invest heavily in IT security solutions to meet a wide range of cyber threats.

According to the latest market study by International Data Corporation (IDC), worldwide spending on IT security solutions will achieve a...

By David H Deans, 09 April 2019, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Research, Security.

The five key things every executive needs to know about identity and access management

  • For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter.
  • Organisations need to recognise that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect camouflage for data breaches.
  • 74% of data breaches start with privileged credential...

By Louis Columbus, 08 April 2019, 0 comments. Categories: Data Loss, Data Management, Enterprise, Security, Software.

Five ways to demystify Zero Trust security – and the vendors who are pushing it

Bottom line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key.

Analytics, Zero Trust dominated RSA

Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed to have Zero Trust Security solutions at RSA, with each one defining the concept in a slightly different way.

RSA has evolved into one of the highest energy enterprise-focused...

By Louis Columbus, 25 March 2019, 0 comments. Categories: Compliance, Data & Analytics, Data Loss, Data Management, Security.

Practical cloud considerations: Security and the decryption conundrum

Compute in the cloud may be cheap but it isn't free. Most of today’s apps are delivered via secure HTTP. That means TLS or the increasingly frowned upon SSL. It means cryptography, which traditionally has been translated to mean performance problems.

Thanks to advances in technology, CPUs are now incredibly fast and many client (and...

Check Point exposes yet more shared responsibility misunderstandings for cloud security

Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cloud provider.

These and other worrying findings have appeared in Check Point’s latest study. The 2019 Security Report, of which this is the third instalment and combined...

By James Bourne, 22 February 2019, 0 comments. Categories: Data Loss, Data Management, Infrastructure, Security.

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data protection provider Virtru has...

By James Bourne, 19 February 2019, 0 comments. Categories: Data & Analytics, Data Loss, Privacy, Research, Security.

AWS launches new security offering which mitigates S3 misconfigurations – if customers get it right

Amazon Web Services (AWS) has announced extra steps to ensure customers’ S3 buckets don’t become misconfigured – but don’t assume responsibility has been taken away from the customer.

The new service, Amazon S3 Block Public Access, can work at the account level, on individual buckets, as well as future buckets created. Users can also block existing public access, or ensure public access is not available for...

By James Bourne, 20 November 2018, 0 comments. Categories: Amazon, Data Loss, Data Management, Security, Vulnerabilities.

As more companies put sensitive data in the public cloud – so the security threats increase

More organisations are putting their sensitive data in the public cloud – so it comes as no surprise that cloud threats, and mistakes in SaaS, IaaS and PaaS implementation are at an all-time high.

That is the key finding from a new report by McAfee, which argues the old bugaboo of shared responsibility continues to kick in and give organisations a kick in the teeth when it comes to cloud security.

By James Bourne, 30 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Infrastructure, Research, Security, Vulnerabilities.

Protecting your company’s crown jewels: Building cloud-based backup and DR into ransomware defence

It’s a sad fact of life that whenever someone owns anything of value, there’s someone else out there who wants to get their hands on it illegally. Today’s corporate crown jewels are the critical data on which organisations depend and the highwaymen are cybercriminals, who have built a lucrative industry from ransomware attacks that disrupt businesses, steal data and aim to extract payment from their victims.

Tackling this scourge is a critical challenge for IT managers on several levels, but...

Companies moving to the cloud without assessing outage possibilities, research argues

Organisations are moving to the cloud without evaluating the impact of a cloud outage, according to the latest study from data management provider Veritas.

The report, titled The Truth in Cloud and put together alongside Vanson Bourne, found that an ‘alarming majority’ of firms shift full responsibility for data protection, compliance and uptime on cloud service providers.

Three in five (59%) of the 1,200 global business and IT decision makers polled said dealing with cloud service interruptions...

By James Bourne, 16 March 2018, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Infrastructure, SLA.

Continuing in the face of disaster: Assessing disaster recovery in the cloud age

With 73% of businesses having had some type of operations interruption in the last five years, business continuity is becoming a concern for many organisations, especially the SMEs. Business continuity incorporates pre-emptive measures such as cyber-defences to minimise risk, proactive tactics such as system backups in case a problem arises and plans for a reactive strategy, which should include disaster recovery (DR), ready in case the worst...

The glitch economy: Counting the cost of software failures

In today’s increasingly digitalised world, the effect of a software glitch can be dramatic. Take an example from July this year when a glitch caused the stock prices of well-known Nasdaq companies such as Amazon, Apple, Alphabet, eBay and Microsoft to be inaccurately listed on websites well after that day’s closing bell.

Even though the actual prices of the stocks were unchanged, the sites showed some had plummeted in price and others had nearly doubled. Unsurprisingly, many people were fooled and...

By Dalibor Siroky, 30 October 2017, 0 comments. Categories: Data Loss, Data Management, Software, Vulnerabilities.

Mind the gap: User demand and IT delivery not on the same page, says Veeam

(c)iStock.com/MarioGuti

More than four in five enterprises globally are facing the dreaded ‘availability gap’ between user demand and what IT can deliver, according to a new report from disaster recovery and backup firm Veeam.

The study, the firm’s sixth annual Veeam Availability Report, polled more than 1,000 senior IT leaders across 24 countries and found that unplanned downtime costs enterprises on average $21.8 million per year, up 36% compared to the past 12 months.

More than two thirds...

By James Bourne, 25 April 2017, 0 comments. Categories: Data Loss, Data Management, Disaster Recovery, Infrastructure.

A guide: Using SmartNICs to implement zero-trust cloud security

In an age of zero-trust security, enterprises are looking to secure individual virtual machines (VMs) in their on-premise data centres, cloud or hybrid environments to prevent increasingly sophisticated attacks. The problem is that firewalling individual VMs using tools like software appliance firewalls or Connection Tracking (Conntrack) is operationally challenging to manage. It delivers bad performance, restricting VM mobility and consuming many CPU cycles on servers, which limits their ability to process...

By Abhijeet Prabhune, 23 March 2017, 0 comments. Categories: Data Centres, Data Loss, Infrastructure, Security, Vulnerabilities.

How often should you test your disaster recovery plan?

(c)iStock.com/Aslan Alphan

By Lily Teplow

As a savvy managed service provider (MSP), you know that having an effective backup and disaster recovery (BDR) solution and disaster recovery (DR) plan is a necessity in today’s business landscape – just in case your client opens an umbrella indoors and their whole IT network crashes. However, having these reliable solutions in place is of no value if the processes aren’t...

Why you can’t let disaster recovery slide off your IT budget in 2017

(c)iStock.com/olm26250

As we welcome in the New Year, we are already seeing multiple blogs prognosticating 2017 trends, setting priorities and suggesting resolutions. We are also rapidly approaching the 2017 budget cycle. I am sure you will read many articles concerning new plans or resolutions for the coming year, but this one will be about an old resolution: IT disaster recovery (DR).

When disaster strikes, organisations need to be able to recover IT systems as quickly as possible. Not having a disaster...

By Monica Brink, 04 January 2017, 3 comments. Categories: Data Loss, Data Management, Disaster Recovery, Infrastructure.

Research argues overconfidence in disaster recovery is ‘common and costly’

(c)iStock.com/roberthyrons

A new UK study from cloud disaster recovery provider iland has found that 95% of respondents have faced an outage or data loss in the past year – with 87% of that number saying it triggered a failover.

The survey, conducted by Opinion Matters and which specifically polled 250 UK decision makers responsible for their company’s IT disaster recovery plans, also found that of the 87% who had executed a failover, while 82% said they were confident it would be successful, 55%...

By James Bourne, 22 September 2016, 0 comments. Categories: Data Loss, Data Management, Disaster Recovery, Security.

Netskope research shows how cloud malware and ransomware remain issues

(c)iStock.com/DundStock

According to the latest research from cloud security provider Netskope, almost 44% of malware found in cloud apps have delivered ransomware, while almost 56% of malware-infected files in cloud apps are shared publicly.

The study, which appears in the company’s latest Netskope Cloud Report, found that the number of cloud apps keep going up in enterprises; 824 on average, up from 777 during the last quarter. Microsoft continues to beat Google as the most popular cloud app, with...

By James Bourne, 08 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.