Why you should look at a global footprint for your cloud: A 10-point guide

With the increased awareness around cloud solutions, most organisations immediately think about reducing cost and shortening time-to-market. As more ideas around cloud are discussed, other criteria like performance, security, compliance, workload segmentation, and how to integrate the cloud become more relevant to an existing environment. The profile of a global cloud footprint; however, is an equally important consideration. 

It may be time to think about why having a...

How IONOS is looking towards privacy and Europe for a solid share of the cloud market

The hyperscale providers continue to dominate the cloud infrastructure and hosting market. According to industry watcher Synergy Research in May, the combined market share of Amazon Web Services (AWS), Microsoft and Google alone was 56%.

Yet one area has the potential to cause concern - and it has pricked the ears of other players looking to capitalise.

In August, CloudTech reported on the ending of the Privacy Shield agreement by the European Court of Justice (ECJ). The...

The US trade war extends from 5G to cloud – with more disinformation and distraction

Comment We have already witnessed how the US administration’s campaign against Huawei succeeded in reversing the UK government’s original decision to allow Huawei to participate in the UK 5G rollout. Even as questions are being raised about the necessity and the economic consequences of this ban, the US is now stepping up its campaign by focusing on Huawei’s cloud business as well. This comes as a strangely welcome distraction for US cloud players that have recently been found to all...

The next steps for the EU and US post-Privacy Shield: How can Europe win the digital race?

Opinion It has been seven years since Edward Snowden exposed the level of surveillance by US intelligence agencies that one might have rather expected from totalitarian countries. Petabytes of private or company data – no matter from which country – are made available to US authorities by default without suspect or a court decision.

While little is known publicly about current practice, it would certainly be more than surprising if the powers and capabilities of the US...

Privacy Shield ruling could lead to dark clouds ahead for hyperscalers, advocates warn

The ending of the Privacy Shield agreement by the European Court of Justice (ECJ) could have serious ramifications for the major hyperscale cloud providers, according to privacy activists.

Privacy Shield is an EU-US agreement which 'provides companies on both sides of the Atlantic with a mechanism to comply with data protection requirements in support of transatlantic commerce', in the words of the framework's website statement.

Max Schrems, a leading privacy advocate,...

Why machines protecting themselves is the future of cybersecurity

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves.

Any nation's digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalise on the...

Q&A, Simon Cuthbert, Tenfold: On the problem of over-privilege and IAM best practices

To misquote Benjamin Franklin, in this world nothing can be certain except death, taxes, and security being the biggest concern for cloud migration. Flexera's most recent State of the Cloud report last month laid it bare; more than four in five (81%) enterprises said security was the main challenge, ahead of managing spend and governance.

The latter two areas are, naturally, also linked to security. But as cloud workloads become increasingly complex, and as multi-cloud moves from...

The rise of obfuscated VPN servers and their use cases: A guide

VPNs continue to be used extensively as tools to protect data security and user privacy. Yet, as to be expected, there are many providers available, and many options within those providers – so buyer confusion can reign.

A virtual private network, by itself, is the secure, private connection between your device and your intended destination. When dealing with VPN servers, the options start to...

Exploring a data-centric approach to data privacy as cloud workloads proliferate

If your organisation, like many others, is putting more and more data into the cloud, you will already know that it’s probably making your security team have kittens. Greater amounts of data being transported in real-time – not to mention the vastly increased number of mobile devices and attack vectors – means the chances for catastrophe have proliferated.

A new study from data...

For better or for worse: Why your brand reputation is hitched to your ability to manage and protect data

The potential benefits of technology to change and improve lives are clear for all to see. At an individual level, wearable devices can help better manage health, home sensors can reduce your energy use and costs, and analytics can hone services to meet your every need. At an organisational level, digital transformation can not only boost efficiency and productivity, but it can change the way that whole industries operate and allow organisations...