Cyber threats could bring your facility down
Is data center operational technology the weak link in the fight against cyber attacks?
Is data center operational technology the weak link in the fight against cyber attacks?
Don't rely on any single measure of security
Maybe your organization only suffered a minor intrusion - but you need to protect against future events
The sheer size of your files will affect your technology choices
Fix the biggest dangers first
There’s a tipping point, especially in cybersecurity, between the volume of information and what should be flagged for action
Companies are under pressure to balance the need for the flexibility and scalability of cloud with traditional infrastructure, at the same time protecting their customers, employees and brand
A year ago, I made predictions. Checking against reality, my grades are a mixed bag
Why Asia Pacific must rethink cloud security
Whilst governance, risk and compliance are often viewed as separate functions, taking a holistic view on these fundamental components demonstrates the symbiotic relationship they share
Reducing the risk of data breaches that exploit IoT networks requires a thorough data protection and device security solution
To make the next 30 years of innovation a reality, the web needs better security, and a means to protect users from harmful and misleading content
When integrating multicloud, companies significantly expand their attack surface, so security posture must be placed firmly at the forefront of their minds
The world’s most successful companies all have something in common – agility
Securing the data center in the year ahead will require dynamic security measures and skills
There is a high possibility that colocation facilities will become some of the first existing data centers to house this new generation of machines
It's not going to get any better
Reducing the need for human intervention means that IT workers can dedicate more time to strengthening their own security efforts
The budget justification question for IT security is difficult to answer.
Implementing micro-segmentation is not a small decision and it does take an organizational commitment
My crystal ball is a bit cloudy at times and I have yet to implement machine-learning into my predictions
Developing sound practices around these key dimensions is not only the purview of IT staff, it is a strategic imperative that requires attention and commitment throughout the organization
Tape still has a place and a role to play
Encryption must be applied much further up the business and more comprehensively across the technology stack