Uncategorized

/Uncategorized

620 Cloud Services Still Vulnerable to DROWN One Week After Disclosure

One week after the critical vulnerability in SSL/TLS named DROWN was disclosed, Skyhigh Cloud Security Labs has found that 620 cloud services remain vulnerable to compromise. That’s not much lower than the 653 services that were vulnerable a week ago. So far, cloud providers have been slower to respond to DROWN compared with other SSL [...]

March 31st, 2016|Uncategorized|0 Comments

2016 Cloud Usage trends in Europe

More cloud services are being launched every week and most of these are aimed at the business sector. Organisations have never had more cloud apps to choose from that provide robust levels of security for enterprise data. Cloud adoption in the workplace continued to increase this quarter, albeit at a slower pace than last quarter. [...]

January 22nd, 2016|Uncategorized|0 Comments

Cloud Usage Governance

Cloud usage is rising exponentially. The number of Cloud Services is increasing approximately 20-25% every quarter. Cloud Services have made a very strong business out of making them easy to sign up to, easy to use, with terrific and engaging user experiences. They are funky and fun with a “Wow” factor often missing from in-house [...]

October 20th, 2015|Uncategorized|0 Comments

How safe is my (or YOUR) data in the cloud?

Organisations all over New Zealand have largely unregulated and unmonitored use of the 15000+ cloud services all over the world. They use these services to upload and download data and files, store Human Resources data and a great deal more. Until recently, the software programs and IT systems that employees use were supplied exclusively by [...]

September 7th, 2015|Uncategorized|0 Comments

Bringing Shadow IT into the light at the NZ Cloud Computing Conference

The 2015 Cloud computing conference is on in Auckland on the 7th of September, 2015, in Auckland Robin Whitaker from Resultex will be speaking at the conference on Shadow IT. Robin's presentations "Bringing Shadow IT into the light" will cover topics such as: • How big is the problem? - Quantifying the use of shadow [...]

July 3rd, 2015|Uncategorized|0 Comments

Common Data Security Questions CISOs Ask Their Teams

As many CISOs will tell you, IT security today is all about protecting data, not data centers. This data-centric view is largely a product of data moving to the cloud and mobile and it’s so relevant today that Gartner focuses on this in their latest research on protecting data in the cloud. In their latest [...]

June 11th, 2015|Uncategorized|0 Comments

The top 10 high-risk cloud services you should consider blocking

Across more than 10,000 cloud services available today,  only 9.3% meet requirements of large enterprises for data protection, identity verification, service security, business practices, and legal protection. While 91% of providers encrypt data in transit between the cloud service and end user, just 10% encrypt data stored at rest in the cloud. Only 15% support [...]

May 2nd, 2015|Uncategorized|0 Comments

Is the Cloud Secure?

The rapid growth of cloud services is an indication that companies are anxious to quickly deploy new cloud-based applications that can make their workers more collaborative, mobile, and productive. However, as sensitive corporate data moves beyond the firewall, IT organizations are understandably unsure about their ability to continue enforcing the security and compliance policies they [...]

December 7th, 2011|Uncategorized|0 Comments