Blog

Crushing Collaboration Clouds in the Work-From-Home Era

By Chris Driggers

For many workers, digital collaboration has become a way of life. Enterprises typically manage these tools in their data center. But this on-premises approach involves the high overhead of upfront costs and ongoing management. It also fails to keep up with our...

Research: Many Organizations Still Take a Reactive Approach to Cybersecurity

Organization are putting a lot of time, money and effort into combating cybersecurity threats. In TechTarget’s 2017 IT Priorities Survey, IT professionals said they spend 23 percent of their time on security-related activities. Only “general IT management” ranked higher, at 27...

Are Your IT Assets Being Disposed of Securely?

Everybody talks about the proliferation of desktop and mobile devices and various Internet-connected objects, including medical monitors and industrial and manufacturing equipment. Everybody talks about the enormous volume of data that is constantly being generated and stored...

The Role of Incident Response in Effective Cybersecurity

A data breach is a costly event. As I noted in my last post, shipping firm Maersk fell victim to a NetPetya malware attack that brought estimated revenue losses of $200 million to $300 million during two weeks of business disruption. That’s many times the $3.62 million average...

Maersk Attack Illustrates the Enormous Cost of Downtime

In a previous post, I discussed the dangers of “aftershock” attacks as organizations continue to feel the impact of the WannaCry ransomware attack. Microsoft issued an emergency patch for the exploit behind WannaCry, but the malware continues to impact PCs and servers running...

Why ‘Aftershock’ Attacks May Bring More Tears than WannaCry

LG recently confirmed that some of its self-service kiosks in South Korea were infected with WannaCry, forcing the consumer electronics manufacturer to shut down some of its systems to prevent further spread of the malware. It’s the latest outbreak of the worst ransomware attack...

Why Security Is Critical to the Success of the Internet of Things

In my last post, I discussed the shared responsibility model of cloud computing, and why organizations must take steps to protect the applications and data that they move to public cloud platforms. Cloud providers are only responsible for securing their infrastructure — not...

Who’s Responsible for the Security of Data in the Cloud?

On June 8, 2017, security researchers discovered a data repository on the Amazon Simple Storage Service (S3) that could be accessed by anyone on the Internet.

The repository contained the names, addresses, account details and personal identification numbers (PINs) of up to 14...

Consolidated Billing Helps Optimize the Cloud Spend

Back in 2009, the National Institute of Standards and Technology (NIST) drafted a formal definition of cloud computing. The definition states that the cloud has certain essential characteristics, including on-demand self-service, broad access, resource pooling and rapid...