Putting data security at the heart of digital transformation – from culture to code
In the new digital economy, data is the most valuable asset a company possesses. However, according to a recent survey by IDC, the spending ceiling for data security is as low as six per cent of the total security budget. Understandably, many information security professionals are feeling the pinch – and increasingly burning out and leaving the industry
How Abbots Care gained greater assurances around data security with a revamped DR and backup strategy
Case study All data is equal, but for some industries, data is more equal than others. As a result, great care needs to be taken when it comes to keeping that data secure, whether in the cloud or anywhere else.
Healthcare, across its various channels, is a classic example. Some healthcare organisations are moving with less trepidation towards the cloud. In February, for instance,
Why adaptability is critical to meet future data centre demands
The next wave of technology innovation is already here with new applications transforming the way we live, work and travel. With the emergence of the Internet of Things (IoT), artificial intelligence (AI), cloud-based services, 4K videos and 5G networks, data centre operators must provide more data capacity and higher computing power if they hope to keep up with the unprecedented demands.
The sheer scale and scope of the gap...
The continuing rise of Kubernetes analysed: Security struggles and lifecycle learnings
Analysis The rapid adoption of container technology, DevOps practices, and microservices application architectures are three of the key drivers of modern digital transformation. Whether built in the cloud, on-premises, or in hybrid environments, containerisation has proved to be significantly more advantageous in terms of scalability, portability, and continuous development and improvement.
More recently, organisations have began to standardise on Kubernetes as their container orchestrator.
Alibaba, Google Cloud and Microsoft among inaugural members of cloud security consortium
The Linux Foundation has announced the launch of a new community of tech all-stars focused on advancing trust and security for cloud and edge computing.
The open source community, dubbed the Confidential Computing Consortium (CCC), has 10 initial members: Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent.
“Current approaches in cloud...
Why it continues to make sense for IT ops to move to the cloud: A guide
There’s been a lot of movement in the IT operations management (ITOM) business lately, from the acquisition of SignalFx by Splunk to the PagerDuty IPO, and all signs point to a Datadog IPO in the future. What’s with all this consolidation? I believe we’re seeing the rise of a future-state of ITOM; that is to say, it’s the rise of SaaS-based ITOM. And it’s easy to see why.
In my previous consulting...
How does privileged access security work on AWS and other public clouds?
Bottom line: Amazon’s Identity and Access Management (IAM) centralises identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today.
AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do other public cloud providers. Designed to provide customers with...
VMworld 2019: Going big on Kubernetes, Azure availability - and a key ethical message
VMware has kicked off its 2019 VMworld US jamboree in San Francisco with a series of updates, spanning Kubernetes, Azure, security and more.
The virtualisation and end user computing giant issued no fewer than five press releases to the wires alone today, with CEO Pat Gelsinger and COO Sanjay Poonen continuing to emphasise the company's 'any cloud, any application, any device, with intrinsic security' strategy.
Chief of these on the product side was around VMware Tanzu, a new product portfolio...
Cloud performance and change management cited in latest DORA DevOps analysis
The performance figures for those at the sharp end of DevOps implementation goes up and up – and cloud usage is increasingly becoming a key differentiator.
That’s the primary finding from the DORA Accelerate State of DevOps 2019 report. The study, which was put together alongside Google Cloud, is a major piece of work, covering responses from more than 31,000 survey respondents tracking six years of research.
VMware stokes VMworld fires with Pivotal and Carbon Black acquisitions
Next week is going to be a busy one for VMware as the company’s VMworld event kicks off in San Francisco. There will be plenty of talking points – and the virtualisation and end user computing provider has opted to add two more with the acquisitions of Pivotal Software and Carbon Black for a combined $4.8 billion (£3.93bn).
Pivotal, at $2.7bn, edged out endpoint security provider Carbon Black ($2.1bn) in...
DigiPlex's data centre guide focuses on sustainability as key to digital transformation
Nordic data centre and colocation provider DigiPlex has launched a guide designed to help businesses solidify their data centre strategies - and avoid making long-term mistakes.
The guide was put together to address gaps in knowledge which DigiPlex argues could significantly impact data centre decision making, with ramifications for the wider business.
Naturally, one of the key topic areas is around alternatives to running on-premises data centres and the skills and experience required, whether it is through...
DevOps learnings: Why every successful marriage requires a solid foundation
The relationship—for lack of a better word—between developers and operations engineers, is more important than many businesses are aware. High-performing teams seem to operate in an easy, DevOps bliss, but for many enterprises, forging new connections to deliver the promise of DevOps ends in frustration and squabbling.
Even the basics, like creating and maintaining useful feedback loops between teams, requires changing attitudes of staff across the organisation. And the requirement for human...
What enterprise IT teams can learn from Google Cloud’s June outage: A guide
In early June 2019, Google Cloud suffered a cascading set of faults that rendered multiple service regions unavailable for a number of hours.
This by itself isn’t totally unprecedented; what made it significant was the way it propagated through the very...
Adding cloud to your analytics ecosystem: A guide
It’s a common question: what should a business executive consider when determining the best approach for adding cloud to an analytic ecosystem?
We at Teradata have thought a lot about this topic because our customers have substantial environments with significant amounts of data, many dozens or hundreds of applications, and thousands of users all over the world.
Planning for such...
Cloud Security Alliance publishes ‘egregious 11’ list of top threats to the cloud
If one other thing besides death and taxes is certain, it is that cloud security will remain a key talking point. Whose responsibility is it exactly – and why does the shared responsibility model continue to cause havoc?
Some areas however can be nailed down much more solidly. The Cloud Security Alliance (CSA) has issued what it calls the ‘egregious 11’ in its latest report, giving organisations an up-to-date...
How the rise of 5G will disrupt cloud computing as we know it
The rollout of 5G has begun in earnest. Verizon and other US carriers have already unveiled the tech and its groundbreaking speeds in a few key markets, and across the pond in the UK, some major carriers are widely expected to deploy 5G later this summer. Many expect 5G to be equally as disruptive – if not more so – than cloud computing has been over the past few years.
All of this raises questions when it comes to...
Enterprise blockchain firm Cypherium secures Google Cloud partnership, adding to AWS deal
Meet Cypherium. The New York-based blockchain startup is partnering with Google Cloud – making it the third major cloud provider to secure a deal with the company.
The company’s goal is to provide an enterprise-ready blockchain platform which promises up to 5,000 transactions per second. Scalability continues to be a concern for organisations looking to utilise blockchain technologies, and is seen as a determining...
What’s in your cloud? Key lessons to learn after the Capital One breach
The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.
The attack behaviours associated with the Capital One breach that occurred in March 2019 are...
A tale of two oligopolies: How JEDI illustrates the need for multi-cloud
Opinion The Joint Enterprise Defense Infrastructure plan, or JEDI for short, has been mired in controversy ever since the US government opened it up for bidding. The $10bn cloud computing contract is at the centre of the Pentagon’s modernisation project and is set to completely overhaul its information technology systems.
This is the largest public cloud contract in history, and whichever provider is chosen will provide the digital infrastructure for the world’s most powerful defense department. The...