Essential Guide
Essential guide to securing hybrid IT infrastructure
Tackling security challenges when moving to a hybrid cloud architecture
Introduction
Security is a constant for any IT architecture, but when moving to a hybrid IT infrastructure, new challenges open up from extending on-premise systems into the public cloud. The greater the potential attack surface, the higher the risk. In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
1Hybrid infrastructure-
Server and datacentre security
Servers and datacentres are prime targets for cyber attacks if not adequately protected. Find out the key challenges when securing hybrid infrastructure
Hybrid IT environment requires hybrid cybersecurity
As more organizations turn to a combination of cloud-based and on-premises systems, protecting data in a hybrid IT environment requires a fresh look at cybersecurity strategy. Continue Reading
Securing virtual infrastructure
When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. ... Continue Reading
Security researchers warn of server-attacking ransomware
New strain of ransomware said to be distributed by compromising servers and using them to move through networks to encrypt and hold multiple data sets to ransom Continue Reading
Datacentre security: Why operators must give cyber and physical threats equal attention
Datacentre operators often talk up the physical security measures they have in place, but are they at risk of overlooking cyber threats? Continue Reading
Most businesses vulnerable to cyber attacks through firmware, study shows
Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed Continue Reading
2Networking-
Network security
The network is at the heart of an effective hybrid IT infrastructure - and securing the network is key to managing risk. Find out about the issues and potential solutions
How software-defined networking can secure critical systems
SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security Continue Reading
Load Balancing for security?
Load Balancing (LB), is now popping up on the corporate security agenda! LB is no longer just about managing traffic flows across enterprise routers and servers. In the age of the cloud and ... Continue Reading
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
Encryption flaw leaves every Wi-Fi network in the world wide open
A Belgian researcher has uncovered a major weakness in the WPA2 Wi-Fi security protocol that is thought to leave every Wi-Fi network in the world open to attack Continue Reading
Focus: Network security

During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end. All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal. In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities. Continue Reading



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
3Data protection-
Data security and GDPR
Securing data across a hybrid IT infrastructure is the primary responsibility of any organisation - and especially as the EU's General Data Protection Regulation (GDPR) puts a focus on securely managing personal data
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
GDPR brings serious implications for data storage
New European Union data protection regulations put tough requirements on organisations that store “personally identifiable data”. We look at what is needed to achieve compliance Continue Reading
Security Think Tank: Integrity of business data key to cyber defence
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading
How to improve security against email attacks and for GDPR compliance
About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies Continue Reading
Dealing with data under GDPR
With the General Data Protection Regulation due to be enforced next year, Computer Weekly looks at how to address the requirements to suit your business Continue Reading
4Hybrid cloud-
Hybrid cloud security
Using public cloud services introduces additional security considerations, especially when combined with on-premise IT in a hybrid infrastructure
Hybrid cloud security challenges remain tough to overcome
While hybrid cloud continues to offer significant benefits to the enterprise, it also demands a cohesive security strategy that bridges on-prem and cloud-based systems. Continue Reading
Security Think Tank: Striking the hybrid cloud balance

Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
Five ways CIOs tackle hybrid cloud security
The traditional moat model is disappearing as companies embrace hybrid cloud strategies from microsegmentation to perimeter controls. Continue Reading
Why immutable buckets are a worthy risk management tool
Immutable buckets offer businesses benefits in terms of data compliance, backup, archiving and security Continue Reading
Focus: Securing the cloud

While cloud services’ benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption. However, for many enterprises the benefits outweigh the risks, and as a result, cloud adoption is still outpacing security capability. Cloud security processes in many companies are still relatively immature, according to some information security leaders. Already heavily-invested in cloud services, technology companies are stepping up efforts around security and the UK Government Digital Service (GDS) has published guidelines that it claims will make public cloud services safe for most government information and services. Despite these positive developments, the reality is that most apps are not enterprise ready from a security standpoint. In the light of the global rise in cyber crime,security experts warn that is more important than ever for applications developed on the widely-adopted Microsoft Azure platform to be secure by design. Continue Reading