Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.
Azure is very easy to deploy but if ISO27001 processes get overlooked because you get the functionality without doing your homework then the business becomes vulnerable to threats warns Ian Daly.
Misconfigured Amazon Web Service (AWS) S3 buckets that allow public writes are enabling man-in-the-middle (MITM) attacks on servers containing data from leading news media, retail and well-known cloud services.
The underlying principles of blockchains are perfect for creating data integrity across an enterprise's value chain, and, says Ian Smith, there are firms developing these 'enterprise blockchains': private, permission-based ledgers.
Protecting this data goes beyond your internal data governance processes says Jim Kaskade, it tests how well the business governs customer data beyond the firewall.
With increasing reliance on cloud applications, businesses must start taking the issue of security in the cloud seriously. They must start asking the right questions about the service providers they are looking at says Joe Pindar
A ransomware encrypted desktop computer is enough to make you Wannacry, but the techniques and tools hackers need to make hostages of cloud services and data are already in the wild argues Mimecast CTO Neil Murray.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
Cloud gives certain tools. We need to understand as organisations where our core competence is and for many companies, it's not infrastructure." But he added that you do need visibility about what is going on.
Cloud-based unified communications services provider Fuze earlier this year repaired three vulnerabilities in a customer web portal.
Carl Boraman looks at the analytics available from cloud-based services and what customers can do to detect fraud in VoIP services.
Despite its security issues, security vendors appear to be migrating security tools to the cloud to provide the answer to CISOs wanting a clearer approach to quicker threat detection and prevention.
According to new research from the Ponemon Institute and Netskope, as cloud services usage - and risk - increases, businesses still lack visibility into data breaches.
Sixty-two percent of organisations leave data protection and availability of in-cloud data to third-party cloud providers.
Nearly two-thirds of businesses (62 percent) regard cloud-based services as the most important trend driving the deployment of applications using PKI (50 percent in 2015) and 28 percent say IoT will drive this deployment.
Ralph Echemendia discusses the best practices for ensuring security of customer data for a contact centre in the cloud
Paul Donovan explains the security issues prevalent for today's multinationals, and how to instigate centralised policies to help manage security and compliance.
Security raises concerns with half of SMEs saying data security is the major barrier between their organisation and the digital workplace. Another 30 percent believe cost is the key issue.
OneLogin has confirmed that a bug has allowed a hacker to view some of its customers' encrypted Secure Notes.
Acronis has appointed Mike Chadwick as VP of engineering and cloud operations.
Dropbox is recommending to some users update the login credentials for their account because a group of member emails and passwords may have been compromised.
Nigel Hawthorn discusses the IT skills crisis and the five skills that will become vital to businesses operating in the cloud
Finding the right partner is the key to making cloud use secure for your organisation says Kevin Patel.
Enterprises are using 20 times more cloud apps than IT estimates, with most using an average of 841 across their extended networks.
Tony Anscombe discusses the biggest mistakes companies make when moving to the cloud and tips to reap the benefits
Cyber- criminals have noticed the lucrative opportunities for wrong-doing in leveraging cloud services and evolved new techniques to their benefit.
Nick Ioannou, head of IT for the Ratcliffe Groves Partnership, draws on his 26 years of experience in IT to claim using a combination of 26 different cloud based services means the company has IT power which could "compete with the big boys" in his industry.
British workers prefer putting their trust in a European Union (EU) state to store their data (40 percent) rather than their own country (38 percent) or those from outside the EU (22 percent).
The latest In Case You Missed It (ICYMI) looks at TeamViewer hijack; Intel's processor defence; 15 per sec cards cloned; Malware via Skype; Cloud apps not GDPR ready