Despite drafting new legislation to stay on par with the GDPR following Brexit, the United Kingdom is lagging behind the United States in investing to comply with the EU’s looming new data protection law. Both countries, though, are equally unprepared for GDPR, new data shows.
All about Virtualization and Cloud Security | Recent Articles:
Eight months to go until the EU’s General Data Protection Regulation takes effect and only 26 percent of government organizations are aware of the impact of GDPR, the lowest of any sector, according to SAS. Privately held companies aren’t much better off.
Organizations worldwide are on track to spend a cumulative $86.4 billion on information security products this year, a 7 percent increase over 2016, Gartner reports. The research firm anticipates that figure will climb to $93 billion in 2018.
Taking a leaf from the EU’s book on data protection, the United Kingdom is preparing to introduce a new law that will see it aligned with the General Data Protection Regulation (GDPR), to be on par with the rest of Europe after it is no longer a member of the union.
The #WannaCry ransomware attack has reached over a quarter of a million computers across over 100 countries. Looking at the “heat map” of attacks it’s obvious that some countries have fared worse than others.
Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates.
More than 1.4 billion data records are estimated to have been compromised in 2016 as a direct result of data breaches, spawning an 86 percent increase compared to 2015, according to a Gemalto’s Breach Level Index. With organizations continuously being targeted by cybercriminals either with sophisticated advanced threats or through infrastructure vulnerabilities, the main driver behind these attacks is often related to financial gains or gratification.
People often complain about how the government spends money inefficiently—and in many cases these criticisms are justified. And when it comes to spending on cyber security solutions, there’s plenty of room for improvement, according to a recent study.
It’s absolutely true that, more often than not, security is a barrier to getting things done. Whether it’s a forgotten password, waiting for resources to be provisioned, or a risk-based decision that requires a new initiative to be delayed because potential risks are too high without some additional mitigation. However, when approached correctly and with some forethought, it doesn’t have to be this way.
As enterprises increasingly embrace cloud computing and cloud services, they must also adjust their cybersecurity spending to reflect the new reality of how they’re using (or not using) their data centers and business-technology systems. The fact that there is a shift in security spending because of so-called digital transformation efforts was made clear in the recently released Global State of Information Security Survey (GSISS) 2017 -- a worldwide study conducted by PwC, as well as CIO and CSO magazines.
Attacks on cloud systems and infrastructure are costly. Consider the recent massive distributed denial of service attack aimed at the Internet infrastructure company Dyn. The attack dragged down Amazon, Netflix, Reddit, Spotify, Tumblr, Twitter and others. The network congestion was largely made possible by compromised IoT devices including video cameras and digital video recorders.