Google digs deeper into the enterprise at Google Cloud Next ‘18

Google Cloud Next '18 put customers, developers, partners and analysts through their paces last week in San Francisco, with an exhausting set of more than 100 announcements. The event confirmed the transformation Google Cloud has undergone since Diane Greene took the helm, and it revealed Google's growing momentum with enterprises and advances against Amazon Web Services and Microsoft.

But if Google really wants to vie for cloud supremacy in the next few years, it must also improve its global...

By Nicholas McQuire, 09 August 2018, 0 comments. Categories: Applications, Cloud , Collaboration, Data & Analytics, Enterprise Mobility.

Dealing in data: Insider tips for effective document management during the M&A process

The efficient management of sensitive and confidential documents is crucial to the completion of a smooth M&A process.

From a seller’s perspective, decisions need to be made throughout the process about who has access to what information, due to competition and privacy concerns. From a buyer’s perspective, the transaction will only proceed once the...

By Tom Wheeler, 08 August 2018, 0 comments. Categories: CIO, Collaboration, Data & Analytics, Employees, M&A.

How to combat daily security threats within the healthcare sector

Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on May 12, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents.

According to the NAO’s published report earlier this...

By Anthony Perridge, 07 August 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, IoT, Security.

The risk of ransomware: How to avoid becoming a victim

Since it made more frequent waves in the headlines in waves in 2017, ransomware – which allows hackers to commandeer a company’s data and hold it under password protection until a ransom is paid – has become one of the most feared and profitable weapons in a cybercriminal’s arsenal. More and more hackers are turning to ransomware because it delivers them the best bang for their buck. Small and medium-sized businesses (SMBs) are particularly vulnerable to this...

By Mark Banfield, 02 August 2018, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

CIOs want cloud, cybersecurity and AI – but not all confident their IT is up to it

Data analytics, cloud and cyber security are the key technologies for CIOs today – but a fair proportion are looking at artificial intelligence (AI) and machine learning.

That is the primary finding from a study by Trace3, a provider of, well, cloud, cybersecurity, and machine learning software. Never mind that however – the statistics from the study, which featured more than 200 responses from the C-suite, as well as vice presidents and directors, are still...

By James Bourne, 25 July 2018, 0 comments. Categories: CIO, Cloud , Data & Analytics, Security.

Industries still ‘in the middle’ when it comes to cybersecurity implementation, Gartner finds

Even though 95% of CIOs expect cyber threats to increase over the next three years, only two in three (65%) organisations currently have a cybersecurity expert.

That’s the key finding from analyst firm Gartner, who polled 3,160 CIO respondents across all major industries that represent approximately $13 trillion in revenue and public sector budgets and $277 billion in IT spending.

The survey also found that skills challenges continue to plague organisations that adopt digitalisation, with digital...

By Enterprise CIO, 23 July 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Why it’s time to wake up to critical infrastructure threats

“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.”

This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that run such infrastructure have been in place for years. Hesitant to make changes for fear of causing disruption, operators seldom...

By Anthony Perridge, 26 June 2018, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Digital transformation: Preparing the business for perpetual change

The term ‘digital transformation’ has been bandied around a lot over the last few years, and frankly you’d be forgiven for being tired of hearing about it. But behind the hyperbole lies a key challenge for every business: how to update and innovate to remain competitive in a world of converging technology.

If done correctly, there are plenty of benefits associated with digital transformation. Automation and the digitising of systems can boost efficiency significantly, especially when they...

By Jim Bowes, 21 June 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Productivity.

The Dresner 2018 business intelligence verdict: Highlights and opportunities

The overall business intelligence (BI) landscape is a healthy one according to the latest report from Dresnor Advisory Services.

The latest 2018 Wisdom of Crowds Business Intelligence Market Study – all 187 pages of it – asserts that better decision making is the most important facet for BI this year, alongside improved operational efficiency and growth in revenues.

Among the highlights include:

Spending

More than half of organisations will increase BI spending with only 6% reporting a decrease in...

By James Bourne, 13 June 2018, 0 comments. Categories: Big Data, CIO, Data & Analytics, Mobile Analytics.

For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It’s a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves from cyberattacks. But, why even choose between the two? 

When it comes to defending from cyberattacks, enterprises need all the help they can get, so why not...

By Ronald Sens, 23 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Five secrets of successful CISOs: Communication, regulation, and more

Today’s CISO is bombarded by jargon. Vendors want them to believe that everything from artificial intelligence, machine learning to blockchain is the silver bullet that will solve all their problems. Far from all the marketing and hype the reality is very different. At the end of the day all CISOs really care about is getting the basics of security right.

More often than not they are caught between a rock and a hard place. Attacks and threats get ever more sophisticated yet senior management...

By Matt Middleton-Leal, 22 May 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employee Education, Employees, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

What the consolidation of phishing awareness training means for CIOs

Last November I was asked for my 2018 cybersecurity predictions, and I was most confident about one. That projection: the phishing awareness training market was primed for consolidation.

Fast-forward just a few months and my inner genie certainly appears to be out of the bottle. By January 3, Barracuda Networks had announced its acquisition of Phishline, a social engineering training platform, for an undisclosed amount. Shortly thereafter, Proofpoint...

By Eyal Benishti, 26 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Security.

Why data should be a strategic asset available to all employees

The question of who owns and controls our data has been in the press a lot these past weeks. But while Cambridge Analytica and Facebook both have serious questions to answer, in other sectors – including work, education, retail and energy – data harvesting is empowering organisations.

While analytics teams have traditionally been made up of data scientists tasked with gathering,...

By Robert Dagge, 25 April 2018, 0 comments. Categories: Big Data, CIO, Data & Analytics, Employees.

Cybersecurity: Four steps CIOs can take to minimise data loss

With cyber-attacks on the rise most IT professionals acknowledge it’s no longer a question of if their organisation will get hacked, but when.

Last year the cyber-attack toll hit an all-time high. According to research by Risk Based Security, 2017 saw a record-breaking 5,000 cyber breaches and resulted in a staggering 7.89 billion records being compromised. Big brand names like Verifone, Verizon, eBay, Uber and Equifax all fell victim to breaches that exposed the personal data of millions of...

By Jan Van Vliet, 17 April 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Why IT directors need to exercise a duty of care to support employees in an emergency

Businesses have procedures in place to protect employees travelling overseas to remote or possibly dangerous countries, but recent terror attacks in the UK have brought the health and safety issues companies face abroad to the home front.  IT directors now have a growing responsibility to ensure the safety and security of their workforce in the event of an emergency, regardless of their location.

The challenge for IT teams is finding technology that offers an effective means of communicating and...

By Raymond Kenney, 10 April 2018, 0 comments. Categories: CIO, Data & Analytics, Employees, Enterprise Mobility.

Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

VMware boosts Workspace ONE features with greater security and automation

VMware has added new features around its Workspace ONE platform to include data-driven intelligence and predictive security.

The new features include Workspace ONE Intelligence, a cloud-based service which integrates with the main platform to aggregate users, apps, networks and endpoint data, as well as the Workspace ONE Trust Network, which combines the security of the primary platform with best practices from featured partners. The seven companies combining with VMware on this are Carbon Black, CrowdStrike,...

By James Bourne, 23 March 2018, 0 comments. Categories: App Platforms, Data & Analytics, Enterprise Mobility, Security.

Why C-suite expertise does not always translate to InfoSec awareness

Their experience and judgement has led C-suite executives to the head of their organisations – yet according to new research from Bitdefender, these employees are most likely to expose the company to a major cyberattack.

According to the study, which polled 250 CIOs, CISOs and CSOs, more than two in five (41%) perceive their C-suite colleagues as InfoSec averse. A similar number (42%) say they are most concerned with a loss of customer and stakeholder trust with data breaches, while more than a quarter...

By James Bourne, 20 March 2018, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Employees, Security.