Evolution Of Managed Services Providers

Evolution Of Managed Services Providers

Originally posted on Technology News:

Managed service

The managed services space is rapidly changing.  The largest drivers of this change include the need to adapt to public cloud-based platforms, the use of big data systems, and the need to provide services that support compliance, such as SOX, HIPAA, and PCI.

The evolution of managed services providers continues to push change toward vertical focuses as…

View On WordPress

Need for Smart Data Visualization is growing - just because you can, should you?

Need for Smart Data Visualization is growing – just because you can, should you?

Originally posted on Technology News:

Virtualisation security

Big data is a big topic. It is one of the most popular buzzwords in the tech world today. From finance and banking, genomics and healthcare, to marketing and communications, nearly all industries want to utilize data to drive business decisions. Advances in communications, social networking, and information technology have fueled a tsunami of Big Data…

View On WordPress

Requirements of a Data Loss Prevention (DLP) System

Requirements of a Data Loss Prevention (DLP) System

Originally posted on Technology News:

Laptop user

There is a right time and a wrong time to wonder how hackers, cyber thieves, or other malicious actors could possibly get past your organization’s defenses and start helping themselves to your data, or doing other damage to your network or systems. The right time is right now. Today. You want to be aware of this possibility and acting on it before any…

View On WordPress

More than half of data stored in cloud is inactive

More than half of data stored in cloud is inactive

Originally posted on Technology News:

cloud computing and uploading

A survey of more than 250 IT professionals from cloud storage provider TwinStrata has found that more than half of organisations have at least half their data as inactive, taking up valuable storage space.

The report defines inactive or passive data as data which has been untouched for 60 days, and found that 56% of those polled had more than half their…

View On WordPress

Browser stores data, such as credit card numbers, in plaintext in Web history on local storage

Browser stores data, such as credit card numbers, in plaintext in Web history on local storage

Originally posted on Technology News:

Web browser

Google Chrome users should take extra precautions when using the browser to type personal data, such as credit card numbers, into website forms, experts say.

Additional steps are necessary because Chrome will store the data in plaintext in its Web history log on the hard drive. The browser retrieves the information as needed to avoid having the user…

View On WordPress

Forensic scientist identifies suspicious ‘back doors’ running on every iOS device

Forensic scientist identifies suspicious ‘back doors’ running on every iOS device

Originally posted on Technology News:

apple-logo

Forensic scientist and author Jonathan Zdziarski has posted the slides(PDF) from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.

The HOPE conference started in 1994 and bills itself as “one of the most creative and diverse hacker events in the…

View On WordPress

The worst data breaches of 2014…so far

The worst data breaches of 2014…so far

Originally posted on Technology News:

identity theft

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker cyberattacks, stolen laptops or dumb mistakes. Here’s the worst of it.

  1. Snapchat, the photo app and delivery service, suffered a security gap…

View On WordPress

Private Cloud VS Managed Cloud VS Public Cloud

Private Cloud VS Managed Cloud VS Public Cloud

Originally posted on Technology News:

Cloud-Computing

Introduction:

Evolution is going on in IT right now. And that, of course, encompasses everything from workload automation to server automation, network, database, etc. It’s really a piece of a bigger puzzle — a very important piece — because, without data, most organizations would be nothing more than a bunch of people on computers piled up. All these…

View On WordPress

What Kind of Data Is Appropriate For the Cloud?

What Kind of Data Is Appropriate For the Cloud?

Originally posted on Technology News:

cloud file sharing

When it comes to cloud the main question that needs to be answered: Is it important to control who has access to the data? If data is publicly available in the first place, as with census or economic data, it doesn’t matter if it’s secure. Placing this type of data in the cloud is a no-brainer, as more people will benefit from the shared knowledge.

On the…

View On WordPress

Why virtualisation isn’t enough in cloud computing

Why virtualisation isn’t enough in cloud computing

Originally posted on Technology News:

Exchange Virtualization

While it is generally recognised that virtualisation is an important step in the move to cloud computing, as it enables efficient use of the underlying hardware and allows for true scalability,  for virtualisation in order to be truly valuable it really needs to understand the workloads that run on it and offer clear visibility of both the virtual and…

View On WordPress