The rapid growth of enterprise mobility and a growing reliance on bring your own device (BYOD) means that most enterprises have to deal with the challenge of securing corporate data in the cloud.
David Shephard |
12 Nov |
Read more
Despite global awareness of the need to improve security practices, organisations remain reluctant to make the changes to their IT environments that would help them to respond more effectively to today’s threats.
David Shephard |
05 Nov |
Read more
With organisations moving escalating volumes of data to the cloud, cyber security strategies need to be augmented with next-generation technologies that can provide increased levels of automation and boost threat-protection capabilities.
David Shephard |
30 Sep |
Read more
The recent data breaches at Capital One and National Australia Bank (NAB) reinforce the evidence that human error represents a serious threat to organisations in finance.
David Shephard |
24 Sep |
Read more
The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data.
David Shephard |
04 Jul |
Read more
The traditional focus of IT security has been on keeping out external threats, but the volume and frequency of security breaches caused by disgruntled, careless or negligent insiders has risen significantly in recent times.
David Shephard |
01 Jul |
Read more
The rise of the cloud in the enterprise stems from its ability to enable anytime, anywhere data access, which increases employee productivity and flexibility.
David Shephard |
17 Apr |
Read more
A growing number of organisations are making strategic choices to avoid relying too heavily upon any single cloud service provider. In other words, they are pursuing multi-cloud strategies.
David Shephard |
03 Apr |
Read more
Cloud cryptojacking –image desc for 1 hijacking cloud resources to mine for cryptocurrency – is currently the fastestimage desc for 2-growing cybersecurity threat to the enterprise.
David Shephard |
15 Feb |
Read more
Now most email users have become accustomed to traditional phishing scams, the methods used by scammers are beginning to evolve
David Shephard |
18 Jan |
Read more
Today, most companies have shifted how they operate in order to pursue the many benefits that can be found with public cloud applications. However, this shift has also introduced a number of previously unseen data security and compliance issues.
David Shephard |
21 Nov |
Read more
As companies spread their wings and journey into the cloud, their workloads inevitably spread into multiple cloud services. While multi-cloud is now seen as a desirable strategy for business, this hasn’t always been the case. Early approaches to cloud adoption often involved moving workloads into a single public cloud service.
David Shephard |
25 Jun |
Read more
Enticed by the benefits of reduced costs and improved flexibility, more and more organisations are adopting infrastructure as a service (IaaS) platforms.
David Shephard |
17 Apr |
Read more
As Microsoft’s Office 365 productivity suite continues to see mass adoption throughout the business world, IT leaders are becoming increasingly aware of the security challenges posed by cloud environments and easy access to corporate data from outside the corporate network.
David Shephard |
07 Mar |
Read more