If you cannot view this email please click here.
Management BYOD Infrastructure IoT Storage SecurityCloud

Features

Cyber security must be a C-Suite priority

Adam Boone of Certes Networks asks why cyber security experts are not involved from day one in every strategic decision

Demystifying the migration to 10G

Why do only a third of SMBs currently have 10 Gigabit switching in place?

The IoT ecosytem

Ryan Lester at Xively offers some practical guidance for successfully implementing IoT

main headline

Rigorous audit

Roman Foeckl at CoSoSys explains why a 'by the book' audit is the essential first step to data compliance

main headline

News

M-Files and AIIM survey reveals frequency of information security breaches

Survey finds that 38 per cent of organisations have experienced one or more information security breaches in the past year

Three steps to cloud security: protecting connected manufacturing

Martyn Williams of COPA-DATA UK details three steps manufacturers should take to stay safe in the cloud

Next Tech Girls celebrates 100 work experience placements

The initiative is celebrating reaching its target of placing 100 year 10 students before the 2016 summer break

Opinion

With great data comes…

IoT promises great data - but it also brings substantial responsibility, according to Larry Augustin of SugarCRM

main headline

The NAC of GDPR readiness

Paul Donovan of Pulse Secure considers how NAC can help protect corporate data and aid compliance with GDPR

main headline

Hyper critical

Sushant Rao at DataCore considers the effect of hyper-convergence on storage infrastructure

main headline

Events

Big Data LDN

3-4 November 2016 - Olympia London
Big Data London will host leading, global data and analytics experts, ready to arm you with the tools to deliver your most effective data-driven strategy. Open to all and free to attend. Discuss the big questions and share ideas with forward-thinking peers and leading members of the Data community. Hear from expert speakers in the Big Data and Analytics conference and seminar tracks and discuss your business requirements with leading technology vendors and consultants. www.BigDataLDN.com

Awards

Network Computing Awards 2016: The Winners!

The results from the 2016 Network Computing Awards were revealed at an evening ceremony at the Hotel Russell in London on 17th March. Here we profile some of this year’s winners:

Software Product of the Year

Winner: Extreme Networks - ExtremeAnalytics

Runner-up: Paessler - PRTG

main headline

Service Provider of the Year

Winner: AirWatch

Runner-up: Rackspace

Distributor of the Year

Winner: Wick Hill

Runner-up: Westcon

main headline
Comment

Welcome to the August 2016 Newsletter.

The Internet of Things, cloud computing and BYOD represent some of the biggest security challenges to our IT infrastructure - but where ultimately does the responsibility lie in meeting these threats? For Adam Boone, Chief Marketing Officer at Certes Networks, cyber security is currently failing to keep up with these trends. In his article in this issue Adam states that “some of the responsibility has to lie with the C-suite. Why are cyber security experts not involved from day one in every strategic decision? Why are businesses still expecting the security team to take responsibility yet leaving deployment in the hands of multiple departments, from application development onwards?”

This is echoed by Martyn Williams, MD of COPA-DATA UK in his article on the security steps manufacturers need to take to stay safe in the cloud. For Martyn “The only way of taking advantage of the benefits of IoT and the cloud is to stay vigilant and use industry best practice. Industrial security is no longer the IT department’s concern, but a 24/7 job for everyone, including those in the boardroom.” The Internet of Things will require the vigilance of everyone it seems, a subject also explored this month by Larry Augustin, CEO of SugarCRM, who writes that “As the technology world looks to the future and the potential that the IoT holds, the need for businesses to maintain a secure infrastructure is set to increase, exponentially.“ Things ain’t what they used to be - and our approach to cyber security needs to evolve accordingly.

Follow us :

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.


 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622