Today's climate of digital transformation (DX) is giving rise to a variety of intriguing cloud and software-as-a-service based offerings.
In the case of public cloud, instant access to infrastructure and platforms for developing new services off-premise may be extremely attractive to some organizations. The modern world of free cloud services and easily installable apps makes it all too easy for employees to bypass the IT department and use whatever systems they want.
Following uncertainty around who was responsible for the compromise of the Democratic National Committee’s (DNC) servers in the US -- which was first blamed on the Russian Government and then claimed by an individual named Guccifer 2.0 -- Fidelis Cybersecurity was approached by personnel handling the investigation for the DNC to undertake an independent investigation in order to provide its perspective on the intrusion.
As part of this investigation, Fidelis analyzed the same malware and data (including file names, file sizes and IP addresses) that were used in the DNC incident. Here are the main findings.
Often the weakest link in an enterprise’s cyber security is the person behind the endpoint. Although technology solutions can offer a high degree of protection, there’s no substitute for making users aware of the potential threats.
Social engineering attacks are increasingly used to try and catch out employees. Education on cyber security is therefore something that's being taken seriously by businesses of all sizes. We spoke to Scott Youngs, CIO of infrastructure solutions and managed services company Key Information Systems to find out more about the threat and how education can help beat it.
Security is often something that gets left until late in the development cycle and as Agile development takes off, security can be an inhibiting factor.
Since many security breaches now target the endpoint, there's more emphasis on building secure software which means it's something that needs to be integrated into the development process. Fixing security flaws late in the day can prove costly and time consuming.
With the growth of the cloud, data centers have become big business. In fact, it's estimated that they now use around 10 percent of the world's energy.
It's not surprising then that companies are looking to increase the efficiency of their IT operations, cut their energy use and reduce their carbon footprints. However, the solution to finding more efficiency may be closer than they think. Jeff Klaus, general manager of Data Center Solutions at Intel argues that enterprises need to look to home grown solutions before turning elsewhere. We spoke to him to find out more.
Yes, the cloud seems to be crushing it, but according to Ellen Rubin, CEO and co-founder of ClearSky Data, as many as 50 percent of cloud customers have brought workloads back on-premise due to latency and performance issues in production applications for dispersed workforces. This makes it a pressing issue for dispersed teams, and threatens forward momentum.
I spoke with Ellen about the problem, how latency affects businesses, and what CIOs can do to address the challenge.
The Payment Card Industry Data Security Standard (PCI DSS) has done much to cut credit card fraud by ensuring that businesses comply with the rules.
But Charles White founder and chief executive of UK-based risk consultancy Information Risk Management (IRM) argues that it has now become little more than a tick box activity which enterprises go through to gain accreditation.
Major tech companies rarely manage to surprise us, but Microsoft did it earlier this week when it announced the acquisition of LinkedIn. The software giant is spending an enormous sum -- $26.2 billion, to be exact -- to get its hands on the popular business-focused social network. The new Microsoft likes to take chances, and this high-profile purchase is certainly proof of that.
CEO Satya Nadella says that buying LinkedIn will allow Microsoft to "change the way the world works", but what is its motivation behind the purchase, how does it tie into its current strategy, and what do the two companies stand to gain from it?
Over the past few years the cloud has significantly changed the way all of us store data, and in many cases how we run software too.
But from an enterprise perspective what impact has the cloud had on traditional data centers, and how is it continuing to evolve? We spoke to Saviz Izadpanah, chief technology officer of HighQ -- which provides cloud collaboration and content publishing services to the world's leading law firms, corporate legal teams and banks -- to find out.
The growth of the Internet of Things, increased reliance on analytics to support decision making, and greater use of video means businesses are storing more and more data. That data has become a crucial asset and storing it so that it's accessible and safe is a major challenge. Solutions from major vendors are costly but data storage operating system specialist RAIDIX has come up with a product that can offer fault tolerance on commodity hardware.
We spoke to Sergey Platonov, product owner at RAIDIX to find out more about the solution and why data storage is now a major challenge.
The security landscape is one that is constantly changing and old-style signature-based detection systems are struggling to keep up.
But what are the main threats today and how can companies and individuals combat them? We spoke to Tomer Weingarten CEO of next-generation security specialist SentinelOne about ransomware and what the LinkedIn hack means for the future of password security.
Businesses are under increasing pressure to replace legacy storage with cloud and hybrid options in order to modernize their infrastructure and cut costs.
Migrating data presents a number of challenges and IT teams are turning to automation in order to address them. We spoke to Jonathan Huberman, CEO of specialist in the hybrid enterprise file sync and share market, Syncplicity, to find out more about how enterprises can move their data smoothly and make it available across a number of devices.
As more and more devices get added to the Internet of Things the risks they present get larger. A recent report from the BBC has highlighted the fact that buildings and their systems for heating, lighting and even security may be at risk.
We spoke to Péter Gyöngyösi, product manager of Blindspotter at contextual intelligence specialist Balabit, to find out more about the risks smart buildings present and how landlords and tenants can guard against them.
The role of chief information officer has become entrenched in large organizations, but smaller businesses often can't afford to employ one. This means that they miss out on the expertise a CIO can bring, but also lack representation of IT at board level.
In some cases businesses are getting around this by outsourcing the role to a 'virtual CIO' who may only be needed for one or two days a month, so they can also work across multiple organizations, and from different locations. We spoke to Dean Coleman, head of service delivery at service management specialist Sunrise Software to find out more about this trend.
With the ever increasing complexity and volume of cyber attacks, companies are increasingly turning to automated solutions and artificial intelligence in the quest for more effective protection.
But how effective is an automated approach and will it become the norm in future? We spoke to Eran Barak, CEO of incident response specialist Hexadite to find out.