How to prevent illness on your network - with the right medicine

The winter season is peak time for infection and disease across the UK.  But the old saying “prevention is better than cure“ is not only relevant to our personal health, but also to our networks and IT systems.

In corporate networks, the classic defence against malware and other external attacks is usually split-up between two solutions: a firewall and a traditional antivirus program. The firewall is similar...

By Ronald Sens, 05 December 2018, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Malware, Security.

It’s going to be a hundred-zettabyte world – with major investments in the edge reaping rewards

Global data creation is predicted to grow to 163 zettabytes (ZB) by 2025, 10 times the amount of data produced in 2017, according to new figures from IDC.

The findings appear in a report put together by the analyst firm alongside data storage firm Seagate. The report, titled ‘The Digitisation of the World: From Edge to Core’, notes how the enterprise is driving this change.

“Where...

By James Bourne, 03 December 2018, 0 comments. Categories: Big Data, Cloud , Data & Analytics, Enterprise Mobility, IoT, Research.

Why more organisations are understanding the benefits of becoming an ‘intelligent enterprise’

If you want to become an ‘intelligent enterprise’ – one where the physical and digital worlds are connected to drive innovation via real-time guidance, data-powered environments and collaborative mobile workflows – then time is running out to be ahead of your peers.

According to new research published by Zebra Technologies, the number of firms who are becoming intelligent enterprises has doubled year over...

By Enterprise CIO, 20 November 2018, 0 comments. Categories: CIO, Data & Analytics, Enterprise Mobility, IoT.

How the IT world wised up to the need for tech that ‘just works’

Believe it or not, but once upon a time, we expected the computer industry to sell us products that were complicated to set up and required specialist expertise at every turn. Early personal computer software involved spending lots of time reading manuals and scratching heads before we got to grips with character-based operating systems and their applications’ cryptic syntax and commands. If you’re in your middle age, you might recall WordPerfect’s scary empty screen or WordStar where you...

By Ashish Shah, 06 November 2018, 0 comments. Categories: Applications, Collaboration, Data & Analytics.

Get to grips with DevSecOps – and address security flaws much more quickly

The number of vulnerable applications in an organisation’s ecosystem remains at a ‘staggeringly high’ level according to new research – but putting DevSecOps practices into action appear to have some benefits.

That’s according to a report from CA Veracode. The latest State of Software Security report – CA Technologies having acquired Veracode last year – gives a ‘promising’...

By James Bourne, 26 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Productivity, Security.

Four cybersecurity challenges that critical infrastructures are facing

Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in April, the UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security (DHS) released a joint alert, warning that the Russian Government had carried out an attack...

By Anthony Perridge, 16 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Deflecting DDoS: Key tactics in the battle against IoT-powered attacks

What makes a DDoS successful? I asked myself that question at the end of August when the central bank of Spain, Banco d’Espana, was hit by a DDoS attack that took its website temporarily offline.

The bank issued a statement acknowledging the attack and stating that “no damage” had been done and its operations, as a central bank with no commercial arm, were not affected, implying that the attack was not successful. Meanwhile, the hacktivist group, Anonymous Catalonia, claimed responsibility...

By Ronald Sens, 03 October 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Mobile, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

Enterprises are finding open source so alluring that vulnerabilities are less important

The Equifax data breach of 2017 was a bad one. Just how bad it ended up being was only revealed in May this year. This isn’t for the faint of heart: 209,000 payment cards, 99 million addresses, and more than 146 million people affected.

Yet these revelations have had little effect on organisations using vulnerable open source software. According to the latest State of the Software Supply Chain report from Sonatype, the...

By James Bourne, 27 September 2018, 0 comments. Categories: Applications, Data & Analytics, Data Loss, Privacy.

How CIOs in Africa are defining new business models for digital transformation

A recently conducted annual CIO survey by global research firm Gartner states that half of the organisations in Africa have changed or are in the process to change their business models owing to the maturing digital business.

The 2019 Gartner CIO Agenda Survey, which polled more than 3,000 CIOs in 89 countries and all major industries, says that CIOs will play an important role in changing the business models within their...

By Enterprise CIO, 24 September 2018, 0 comments. Categories: CIO, Data & Analytics.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

Building trust in a ‘zero trust’ environment: A more dynamic security model

Today’s working environments are no longer governed by the perimeters and boundaries they once were.  As a result, security threats have multiplied and the pressure on IT teams to protect data has increased rapidly. Modern work happens in a mobile-cloud environment outside traditional security controls, and from the perspective of those controls it’s a zero trust environment.

As attacks become more sophisticated, security professionals are forced to reconsider the best practices on which...

By Ojas Rege, 17 September 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Enterprises waiting months for security updates may cause concern in ‘as a service’ future

Revamping an enterprise’s IT security is never going to be a simple flick of a switch. Yet for more than a quarter of organisations polled by enterprise software provider Kollective, it will take at least a month before vital updates are installed.

The study, which polled 260 IT managers, found that for almost two in five (37%), not installing updates is seen as the biggest security threat this year, with outdated...

By James Bourne, 22 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Google digs deeper into the enterprise at Google Cloud Next ‘18

Google Cloud Next '18 put customers, developers, partners and analysts through their paces last week in San Francisco, with an exhausting set of more than 100 announcements. The event confirmed the transformation Google Cloud has undergone since Diane Greene took the helm, and it revealed Google's growing momentum with enterprises and advances against Amazon Web Services and Microsoft.

But if Google really wants to vie for cloud supremacy in the next few years, it must also improve its global...

By Nicholas McQuire, 09 August 2018, 0 comments. Categories: Applications, Cloud , Collaboration, Data & Analytics, Enterprise Mobility.

Dealing in data: Insider tips for effective document management during the M&A process

The efficient management of sensitive and confidential documents is crucial to the completion of a smooth M&A process.

From a seller’s perspective, decisions need to be made throughout the process about who has access to what information, due to competition and privacy concerns. From a buyer’s perspective, the transaction will only proceed once the...

By Tom Wheeler, 08 August 2018, 0 comments. Categories: CIO, Collaboration, Data & Analytics, Employees, M&A.

How to combat daily security threats within the healthcare sector

Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on May 12, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents.

According to the NAO’s published report earlier this...

By Anthony Perridge, 07 August 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, IoT, Security.

The risk of ransomware: How to avoid becoming a victim

Since it made more frequent waves in the headlines in waves in 2017, ransomware – which allows hackers to commandeer a company’s data and hold it under password protection until a ransom is paid – has become one of the most feared and profitable weapons in a cybercriminal’s arsenal. More and more hackers are turning to ransomware because it delivers them the best bang for their buck. Small and medium-sized businesses (SMBs) are particularly vulnerable to this...

By Mark Banfield, 02 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

CIOs want cloud, cybersecurity and AI – but not all confident their IT is up to it

Data analytics, cloud and cyber security are the key technologies for CIOs today – but a fair proportion are looking at artificial intelligence (AI) and machine learning.

That is the primary finding from a study by Trace3, a provider of, well, cloud, cybersecurity, and machine learning software. Never mind that however – the statistics from the study, which featured more than 200 responses from the C-suite, as well as vice presidents and directors, are still...

By James Bourne, 25 July 2018, 0 comments. Categories: CIO, Cloud , Data & Analytics, Security.

Industries still ‘in the middle’ when it comes to cybersecurity implementation, Gartner finds

Even though 95% of CIOs expect cyber threats to increase over the next three years, only two in three (65%) organisations currently have a cybersecurity expert.

That’s the key finding from analyst firm Gartner, who polled 3,160 CIO respondents across all major industries that represent approximately $13 trillion in revenue and public sector budgets and $277 billion in IT spending.

The survey also found that skills challenges continue to plague organisations that adopt digitalisation, with digital...

By Enterprise CIO, 23 July 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.