Cloud security fears continue: Managed services, messaging, FaaS at ‘perilous’ stage

As adoption of managed infrastructure services increases, new cloud attack areas arrive with them. According to a new report from Accurics, 23% of all security violations identified relate to poorly configured manage service offerings.

The study, Accurics' Cloud Cyber Resilience Report, assessed violations and drifts in real-world environments of Accurics users, as well as open source repositories and registries of infrastructure as code (IaC) components.

On average, the...

Securing IT systems in the hybrid workplace with identity governance: A guide

The current reality of massive remote work began as a pandemic-induced necessity, but what most thought would be a short-term stopgap has become the current norm. And that’s not entirely a bad thing. I’m sure most workers don’t miss commutes or traffic, and enjoy the extra sleep and being able to take a conference call in their pajamas . As organisations have seen that they are still able to function, more and more employers and employees are embracing remote work as a viable...

Featured: CloudTech’s list of innovative cloud companies to watch in 2021

Featured 2020 was a fascinating year for cloud technologies. The Covid-19 pandemic forced remote working initiatives which accelerated demand for cloud software and infrastructure. 2021 is going to be about taking advantage of the opportunities which have arisen, with multi-cloud and hybrid cloud to the fore.

As Andrew Brown, general manager EMEA for IBM Cloud and Cognitive Software wrote for this publication last month, while 2021's exact playout is unknown, the company "expects...

Why cybersecurity isn’t cybersecure without detection and recovery

Anyone responsible for data security who doesn’t get a shiver down their spine when they read the about yet another high-profile ransomware attack in the news is either doing something very right, or something very wrong.  

The danger of falling victim to a cybersecurity issue is getting greater as the volume of attacks continues to rise and bad actors become increasingly sophisticated. Interpol has highlighted how Covid-19 affected both the number and nature of...

Shadow IT is always going to be here – so learn how to harness it for your business goals

Many IT leaders expected that shadow IT usage would decrease as their organisations’ cloud strategies became more sophisticated. This was a good thing, they thought, because the ominously named practice of using unapproved applications posed a real threat to cybersecurity: Gartner predicted way back in 2016 that one third of successful enterprise attacks would be on shadow IT resources.

In fact, the opposite has happened. New waves of cloud technology have enabled new business...

Five tips for observability success amid cloud complexity

In 2020, the concept of observability in IT operations gained mindshare as IT leaders looked for new ways to rein in the complexity that’s grown organically with cloud computing and rapid digitisation.

Observability differs from IT monitoring in that it focuses on the development of the application and rich instrumentation so that operators can ask meaningful questions about how the software works or is working in production. The ability to ask new questions allows IT to gain...

Four essential strategies to secure users across all environments: Integration, automation, and more

Today’s distributed networks are increasingly diverse, often spanning multiple environments, each with their own unique requirements and standards. Securing each of those network ecosystems is challenging, especially when the end goal is consistent policy enforcement, centralised visibility, and unified orchestration and response. Organisations not only need to secure and manage both hardware-defined and software-defined perimeters, but also maintain security as those network edges...

Software dominates the Deloitte 2020 Tech Fast 500 – with 71% of all companies chosen

Software companies continue to deliver the highest growth rates for the 25th straight year, representing 71% of the entire list, the highest-ever percentage in the history of the rankings 353 of the 500 fastest-growing companies in North America are in the software industry according to Deloitte’s 2020 Tech Fast 500, the most ever in the history of their rankings and a 3% increase over last year Two of the ten fastest-growing companies over the last three years specialise in cybersecurity,...

Gartner outlines seven steps to creating a strong enterprise cloud strategy

What does your cloud strategy need to look like to ensure seamless adoption and opportunities going forward? According to Gartner, planning and preparation are a given, as well as ensuring overall business strategy is aligned.

The analyst firm outlined seven key elements for an enterprise cloud strategy at its virtual Gartner IT Infrastructure Operations & Cloud Strategies Conference earlier this week.

According to a study from Centrify earlier this month, almost...

Looking to adopt hybrid cloud? Don’t overlook governance

The adoption of hybrid IT environments is a standard aspect of digital transformation. During this process, many organisations encounter difficulties arising from managing access and identities across multiple applications, clouds, networks and servers. Delivering a good digital business experience to all your stakeholders – customers, employees and business partners – while managing risk requires the use of modern identity and access governance solutions. With these types of solutions,...