Cohesity brings Intel’s confidential computing capabilities to Cohesity Data Cloud

Cohesity, a specialist in AI-powered data security and management, has collaborated with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud.

Leveraged with Fort Knox, Cohesity’s industry-leading cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry.

Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally,...

Spike in cloud account compromises and email forwarding rule abuse detected

A graphic of a padlock.

Cybersecurity firm Red Canary has unveiled its sixth annual Threat Detection Report, examining the trends, threats, and adversary techniques that organisations ought to prioritise in the coming months and years.

The report tracks MITRE ATT&CK techniques that adversaries abuse most frequently throughout the year, and two new and notable entries soared to the top 10 in 2023: Email Forwarding Rule and Cloud Accounts. 

Red Canary’s latest report provides in-depth...

Why companies continue to struggle with cloud visibility – and code vulnerabilities

A new report from the Cloud Security Alliance (CSA) has thrown up more difficulties organisations are facing in security remediation – and achieving visibility from code to cloud.

The report, produced in collaboration with security firm Dazz, polled just over 2,000 IT and security professionals to better understand current cloud environments and security tools. The results were less than confident.

Less than a quarter (23%) of organisations polled reported full...

Rik Chorus, Kyndryl: How to defend against evolving cybersecurity threats

Rik Chorus, Kyndryl’s director of security and resiliency & networking and edge, Benelux, discusses how the firm is helping organisation’s navigate their way through an ever-changing tech and business landscape.

Can you tell us a little bit about Kyndryl and what you do at the company?

There are a few things that I think are really interesting and that set Kyndryl apart from everything I've seen in the market so far. One of the things is that Kyndryl, as the...

Encryption demand soars as 60% of business data kept on the cloud

The demand for cloud encryption is estimated to increase at a CAGR of 30.9% from 2022-2032. The market valuation is projected to increase by US$ 2.4 Bn by 2022 & US$ 34.8 Bn by 2032.

This is according to Future Markets Insight (FMI), which says organisations are investing in the modernisation of data storage strategy with the adoption of cloud technologies for digital transformation. This is expected to drive growth in the cloud encryption market.

The growing need to...

Views from the field: Shifting left in enterprise cloud security  

A field on a sunny day.

Stuart Green, cloud security architect at Check Point Software, explains how businesses can mitigate cybersecurity risks.  

As of 2022, 94% of enterprises use cloud services. Confidence in the cloud has grown over the last 12 to 18 months, with 35% of organizations having more than 50% of their workloads in the cloud. While businesses are quick to deploy cloud solutions at scale, we’re not seeing the same rapid adoption of preventative cybersecurity measures to keep this...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Brightsolid launches tailored Managed Detection and Response service

Elaine Maddison, Brightsolid

Managed hybrid cloud service provider Brightsolid has launched its first Managed Detection and Response (MDR) service, tailored specifically for organisations in Scotland and the north of England.

Headquartered in Dundee with offices and data centres in Aberdeen, the company has been delivering managed services to the UK private and public sector for 25 years. It identified a need for a cybersecurity product tailored to its market, offering proactive protection against threats...

Cloud computing security risks and the common pitfalls

As more companies rely on cloud-based technology, particularly because remote working is so widespread, it’s crucial to ensure systems are secure and confidential data remains protected. Using cloud storage is not necessarily dangerous, but there are some security weaknesses that businesses should be aware of and understand how to prevent.

The following are some of the most common cybersecurity pitfalls:

Data breaches

A key cloud security risk is poor security...

Data sprawl creates risk as personal app use in business continues to rise

Someone using apps on a smartphone.

Cloud app use within organisations has continued to rise, already increasing 35% since the beginning of 2022, with an average company of 500-2,000 users uploading, creating, sharing or storing data in 138 different apps, and using an average of 1,558 distinct cloud apps each month.

This is according to Netskope, a specialist in Security Service Edge (SSE) and Zero Trust, which has released new research detailing the proliferation of cloud apps used within businesses...