Ransomware, a part of fast emerging Advanced Persistent Threats family, is a fearsome set of viruses attacking computing systems. The biggest concern is they target almost any industry-ports, power grids, healthcare, finance, law, advertising etc. and information can be lost forever.
Just a couple of days back, media around the world exploded with news of another ransomware attack. Petya, a ransomware wormed its way into information systems in ports, law firms, ad agencies, and supermarkets, besides its favorite victims – firms in the financial and healthcare domains. Its intention, as reported, is to destroy and cause mayhem in the information world bringing businesses to a halt. With systems compromised and data loss, revenue will take a big hit.
It is appropriate to ask now– how did this ransomware attacks computer, and worse, how did it spread? Continue reading
Cloud computing is widely used as one of strategic levers to drive innovation and agility. As enterprises are undertaking the path towards cloud aligned to different business use cases, hybrid data centers are becoming the reality. Increasingly enterprises critical and sensitive workloads are distributed across private cloud (Data Centers), public Cloud and SAAS platforms.
Any cloud strategy should support higher business level objectives and strategies. This means that most organizations will not be able to define a single “one size fits all” cloud strategy. It’s therefore imperative that setting cloud strategy must assess the possible risks which are guided by Enterprise risk regime. Continue reading
Security concerns form the main reasons for the reluctance among businesses to move to public cloud applications. However, paradoxically, the advanced technologies and protocols that modern cloud service providers offer improved security for the applications. Cloud computing and IT security are often seen as divergent concepts but from a wider perspective, cloud computing technologies actually help propel IT security.
With better encryption, better tools and processes the shortcomings and concerns of cloud computing from a security perspective are being addressed. With cloud architectures that are virtualized and automated, infrastructure administrators now have a greater degree of control over the design and deployment of an infrastructure, with little scope for human error. In addition, the wide availability of security tools with very low upfront costs and the distributed nature and fault-tolerant architecture allows the cloud to offer the best security tools and services. Continue reading
Security-as-a-service (SECaaS) or Internet-based security or cloud security products is an outsourcing model for security management. Here a third-party vendor delivers applications such as anti-virus software over the Internet. It can also refer to security management software provided in-house by an external organization.
Such systems are the next step in the evolution of Managed Security Services (MSS) and Gartner indicates that the demand for SECaaS will grow significantly and might substantially change existing IT security infrastructure environments aided by the fact that new forms of threats are also emerging with Cloud Computing’s growth. Continue reading
With an increasing number of cyber security breaches affecting notable names, no company would confidently say they are fully protected or prepared to handle a sophisticated cyber-attack. Traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe and it is time for automation to beef up cyber security for greater defense.
Recent attacks have been driven by automated bots and such intensive, sustained attacks make it a tough fight to handle the sheer volume and make quick and high-impact decisions to handle these threats efficiently. In these circumstances, security automation has become a powerful and effective component of cyber security incident response in combating the onslaught of incoming threats. Moreover, automation now goes beyond protecting just the technologies, but expanding into applications for IT infrastructure and the enterprise IT environment. From real time monitoring to alerts and incident response planning and investigation, security automation contributes to establishing a comprehensive security envelope for the enterprise. Continue reading
The storage requirements in businesses are growing manifold with the increasing information that companies access, collect and process. Cloud computing is now a rapidly growing and evolving concept now and its popularity is due to a plethora of advantages. The biggest feature of the cloud is the data accessibility from any part of the world that increases work efficiency and reduces costs of operations in the longer run. Another advantage of cloud storage is that remote data backup on the cloud reduces the costs associated with disaster recovery and backup units. Continue reading
Migrating an enterprise to the Cloud calls for a well-thought out strategy. As businesses get increasingly digitised and data generated increases exponentially, enterprises have to ascertain what cloud migration strategy works for them on the one hand, and if that strategy is successful, on the other.
The decision to migrate to the Cloud also requires that all architects understand application migration from multiple perspectives and criteria. These include: Application architecture, IT staff capabilities, investments made, and so on. Today, studies suggest that data management costs account for 70 percent of IT spend, every reason to ensure that the Cloud migration gameplan works like a charm. Continue reading
The benefits, utility and advantages of using the cloud platform for enterprise computing are no longer points of debate and too attractive to ignore. It is an attractive and efficient option for companies to avoid high capital outlays for new servers and the overhead costs of managing on-premises architecture. Companies moving to the cloud can transform different facets of their business, and harness the full potential of the cloud and cloud-based services like machine learning, data analytics, etc. Continue reading