IoT is part of a fundamental shift forward in enterprise networking - towards a cloud-enabled 'consume' approach - and yet most companies plan to implement IoT in a way that parallels an outdated way of 'DIY' networking.
Most cloud providers are only responsible for protecting the infrastructure that runs these services, while the customer is responsible for security inside the cloud, creating a shared responsibility of both the cloud provider and customer.
A GulfTech researcher spotted multiple vulnerabilities In Western Digital's MyCloud products, some of which could lead to remote code execution and unauthorised access.
Ever on the lookout for a new avenue of attack, cyber-criminals have figured out a method of using Google App Scripts to automatically download malware hosted in Google drive to any computer.
Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.
Azure is very easy to deploy but if ISO27001 processes get overlooked because you get the functionality without doing your homework then the business becomes vulnerable to threats warns Ian Daly.
Misconfigured Amazon Web Service (AWS) S3 buckets that allow public writes are enabling man-in-the-middle (MITM) attacks on servers containing data from leading news media, retail and well-known cloud services.
The underlying principles of blockchains are perfect for creating data integrity across an enterprise's value chain, and, says Ian Smith, there are firms developing these 'enterprise blockchains': private, permission-based ledgers.
Protecting this data goes beyond your internal data governance processes says Jim Kaskade, it tests how well the business governs customer data beyond the firewall.
With increasing reliance on cloud applications, businesses must start taking the issue of security in the cloud seriously. They must start asking the right questions about the service providers they are looking at says Joe Pindar
A ransomware encrypted desktop computer is enough to make you Wannacry, but the techniques and tools hackers need to make hostages of cloud services and data are already in the wild argues Mimecast CTO Neil Murray.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
Cloud gives certain tools. We need to understand as organisations where our core competence is and for many companies, it's not infrastructure." But he added that you do need visibility about what is going on.
Cloud-based unified communications services provider Fuze earlier this year repaired three vulnerabilities in a customer web portal.
Carl Boraman looks at the analytics available from cloud-based services and what customers can do to detect fraud in VoIP services.
Despite its security issues, security vendors appear to be migrating security tools to the cloud to provide the answer to CISOs wanting a clearer approach to quicker threat detection and prevention.
According to new research from the Ponemon Institute and Netskope, as cloud services usage - and risk - increases, businesses still lack visibility into data breaches.
Sixty-two percent of organisations leave data protection and availability of in-cloud data to third-party cloud providers.
Nearly two-thirds of businesses (62 percent) regard cloud-based services as the most important trend driving the deployment of applications using PKI (50 percent in 2015) and 28 percent say IoT will drive this deployment.
Ralph Echemendia discusses the best practices for ensuring security of customer data for a contact centre in the cloud
Paul Donovan explains the security issues prevalent for today's multinationals, and how to instigate centralised policies to help manage security and compliance.
Security raises concerns with half of SMEs saying data security is the major barrier between their organisation and the digital workplace. Another 30 percent believe cost is the key issue.
OneLogin has confirmed that a bug has allowed a hacker to view some of its customers' encrypted Secure Notes.
Acronis has appointed Mike Chadwick as VP of engineering and cloud operations.
Dropbox is recommending to some users update the login credentials for their account because a group of member emails and passwords may have been compromised.
Nigel Hawthorn discusses the IT skills crisis and the five skills that will become vital to businesses operating in the cloud
Finding the right partner is the key to making cloud use secure for your organisation says Kevin Patel.
Enterprises are using 20 times more cloud apps than IT estimates, with most using an average of 841 across their extended networks.
Tony Anscombe discusses the biggest mistakes companies make when moving to the cloud and tips to reap the benefits