In Depth
In Depth
Cloud security
-
Taking responsibility for security in the cloud
From accidental leaks to full-on data breaches, maintaining security across cloud services is becoming a headache for enterprises. What questions should organisations be asking of their cloud service provider and, ultimately, whose responsibility is... Continue Reading
-
McAfee’s push for secure cloud adoption
Organisations must do more to secure their cloud environments as malicious actors increasingly focus their attention on exploiting cloud vulnerabilities, says McAfee Continue Reading
-
Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data
Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Continue Reading
-
Cloud snapshots and backups: How to protect data in the cloud
You often need more data protection than native cloud services will give. But should you choose backup or snapshots? And what about third-party backup in the cloud? Continue Reading
-
A guide to choosing cloud-based security services
Cloud-based security services can help organisations with a growing cloud footprint to reduce cost and address the manpower crunch in cyber security Continue Reading
-
A cloud compliance checklist for the GDPR age
The cloud is supposed to make things simpler, but when it comes to compliance, things can get complex. Here is a look at the essential elements of a cloud compliance strategy Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Inside DevOps, containers and enterprise security
Global corporates are waking up to containers and orchestrated containerisation for software development that is fast and safe. Computer Weekly looks at the best approach to ensure security is not compromised along the way Continue Reading
-
GDPR compliance: Addressing the overlooked in enterprise IT infrastructures
As the GDPR compliance deadline approaches, enterprises need to ensure they have looked beyond the headline-grabbing aspects of the regulation so they do not fall foul of the incoming data protection regulations Continue Reading
-
Network security in the digital transformation era
Network security has always been a core focus for CISOs and IT security managers, but in an era of digital transformation, we examine if network security strategies are keeping up with new and emerging cyber threats Continue Reading
-
AWS cloud security: Amazon CISO shares secrets to building secure cloud products
Ahead of Re:Invent 2017, AWS CISO Stephen Schmidt discusses how the cloud giant addresses user demand for new products and services, without compromising on cloud security Continue Reading
-
Microsoft SPE helps joined-up thinking
We assess how Microsoft’s secure productive enterprise licence can help enterprises coordinate their digital transformation Continue Reading
-
Why immutable buckets are a worthy risk management tool
Immutable buckets offer businesses benefits in terms of data compliance, backup, archiving and security Continue Reading
-
Tips on how to get a Hana implementation off the ground
The confusion around SAP’s in-memory database is holding many customers back. We look at some of the approaches being taken to simplify implementation Continue Reading
-
Cloud, AI and security driving network monitoring industry
We explore the latest developments and trends in enterprise network monitoring and management Continue Reading