Looking to adopt hybrid cloud? Don’t overlook governance

The adoption of hybrid IT environments is a standard aspect of digital transformation. During this process, many organisations encounter difficulties arising from managing access and identities across multiple applications, clouds, networks and servers. Delivering a good digital business experience to all your stakeholders – customers, employees and business partners – while managing risk requires the use of modern identity and access governance solutions. With these types of solutions,...

83% of enterprises transformed their cybersecurity in 2020 – accelerated by Covid cloud migration

73% of enterprises (over 500 employees) accelerated their cloud migration plans to support the shift to remote working across their organisations due to the pandemic. 81% of enterprises accelerated their IT modernisation processes due to the pandemic. 48% of all companies surveyed have accelerated their cloud migration plans, 49% have sped up their IT modernisation plans because of Covid-19. 32% of large-scale enterprises, over 500 employees, are implementing more automation using...

Reducing identity and access security risks in cloud infrastructures: A guide

Organisations understand the business value of cloud environments like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP), but many haven’t realised how these infrastructures increasingly place the onus on them to manage security risk. In fact, Analyst firm Gartner has estimated that over the next three years 99% of cloud security failures will be the customer’s fault. Further, Gartner predicts that 75% of those failures will result from inadequate management of...

What makes the quintessential chief information security officer?

Given the strategic significance of digital transformation, IT security leadership is a really important role. And yet, only 12 percent of chief information security officers (CISOs) excel in all four categories of the 'CISO Effectiveness Index', according to the latest worldwide market study by Gartner.

Gartner analysts presented their global survey findings and discussed the key traits of top-performing CISOs during their recent 'Security & Risk Management...

Palo Alto Networks warns of ‘critical’ IAM misconfigurations potentially worth millions

Cloud misconfigurations continue to cause major headaches for organisations - and a recent report from Palo Alto Networks has uncovered an identity and access management (IAM) flaw that could have been worth 'millions.'

The finding appears in the security provider's Cloud Threat Report 2H 2020. The disclosure (28 pages, PDF, email required) came about after the Unit 42 cloud threat intelligence team - the research arm of Palo Alto - was contacted by a customer requesting a test of...

What’s new in Gartner’s Hype Cycle for endpoint security 2020

Remote working’s rapid growth is making endpoint security an urgent priority for all organisations today Cloud-first deployment strategies dominate the innovations on this year’s Hype Cycle for Endpoint Security Zero Trust Security (ZTNA) is gaining adoption in enterprises who realise identities are the new security perimeter of their business By 2024, at least 40% of enterprises will have strategies for adopting Secure Access Service Edge (SASE) up from less than 1% at year-end...

Thoughts on encryption legislation – and the real ‘link’ between 5G and coronavirus

Opinion Conspiracy theories are nothing new, but the recent one that blamed the rollout of 5G networks for the spread of Covid-19 is one of the more bizarre examples in recent memory. Not only is it very obviously untrue to anyone that understands either the technology or virology, but there is also little real correlation. New Zealand which was one of the first countries to declare itself virus-free is accelerating its current 5G rollout while Brazil and the USA which have seen the highest...

Stopping cloud attackers in their tracks: A guide

As more organizations shift from an on-premises model to the cloud, Gartner has predicted that the cloud services industry will grow almost three times faster than overall IT services through 2022. The typical business relies on a hybrid mix of public and private clouds, coupled with traditional on-premises infrastructure. As more businesses move critical operations to cloud applications – such as choosing Salesforce as their CRM or using Microsoft Azure for hosting their databases –...

Why machines protecting themselves is the future of cybersecurity

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves.

Any nation's digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalise on the...

Three reasons to perform your cloud security risk assessment ASAP

The unprecedented shock to world markets in the wake of the COVID-19 pandemic will likely permanently change the way we work. Millions must work from home, and businesses are scrambling to find ways to maintain productivity.

The shift to utilising a completely remote workforce has been relatively seamless for some companies and utterly chaotic for others. Adding to the chaos, cybercriminals are targeting organisations of all types with coronavirus-related phishing campaigns and...