Secure at the Speed of DevOps – What the State of DevOps Report Tells Us

Secure at the Speed of DevOps – What the State of DevOps Report Tells Us

The 2017 State of DevOps Report (Puppet Labs) shows a strong correlation between IT performance and the speed/lead-time associated with changes and deployments. Organisations are

Read the full article…

Learn more
Making Cloud Security Best Practices Work for You

Making Cloud Security Best Practices Work for You

As we mentioned in our las blog Effectively Managing Security Challenges in Multi-Cloud Deployments, developing a standard or set of cloud best practices from scratch

Read the full article…

Learn more
Effectively Managing Security Challenges in Multi-Cloud Deployments

Effectively Managing Security Challenges in Multi-Cloud Deployments

In our last blog we looked at who is responsible for securing the public cloud. This time we are looking at how to tackle the

Read the full article…

Learn more
Securing the Public Cloud, Whose Responsibility is it?

Securing the Public Cloud, Whose Responsibility is it?

Security is a shared responsibility between the cloud provider and the customer.  The ‘shared responsibility’ model stipulates that cloud providers (e.g. AWS, GCP, Azure) own

Read the full article…

Learn more
Why outsourcing needs a warm body and the customer is king

Why outsourcing needs a warm body and the customer is king

– Ryan Coombes, Gyrocom’s Technical Director talking about what’s really going on in IT departments wrestling with outsourcing So what are the issues with outsourcing

Read the full article…

Learn more

Why the New Generation of Data Centre requires Next Generation Security

Cybercrime is perhaps the most serious threat to businesses today, yet many executives still underestimate the risk that it poses to their organisation. Today’s hackers

Read the full article…

Learn more
The Rise of SDN and NV: Strengthening Corporate Infosecurity Policies Like Never Before

The Rise of SDN and NV: Strengthening Corporate Infosecurity Policies Like Never Before

A lot has been written about how today’s I.T. Infrastructure security models are broken. The days of securing the perimeter and trusting everything and everybody

Read the full article…

Learn more
Securing the Next Generation of IT Infrastructure: Firewalls

Securing the Next Generation of IT Infrastructure: Firewalls

System Virtualisation and the Software Defined Data Centre (SDDC) have lead to radical changes in how we design and implement security in our environments. When

Read the full article…

Learn more
What technology changes need to occur to drive greater cloud adoption

What technology changes need to occur to drive greater cloud adoption

Cloud services like Dropbox and Microsoft’s SkyDrive have been phenomenal commercial successes, giving consumers a quick and simple way to manage the task of backing

Read the full article…

Learn more