Securing the Modern Workplace: Expert Insights and Recommendations
/In this episode of the Adopt 365 podcast, we're immersing ourselves in the dynamic realm of Microsoft 365 security.
Read MoreIn this episode of the Adopt 365 podcast, we're immersing ourselves in the dynamic realm of Microsoft 365 security.
Read MoreThe Cyber Essentials (CE) scheme has a number of major updates being introduced into the scope in January 2022. This blog post will give you a summary of the changes so that you know what to expect if you commence the self-assessment after January 24th.
Read MoreWith the increase of cyber-attacks and the fragmentation of data, ComputerWorld is challenging businesses to scrutinise the security and protection of their data. To do this, our team has created a list of five top tips which you should use to review your current plan and appraise whether it is fully prepared for today’s “new norm”.
Read MoreAlthough the world around us may have slowed down considerably in the last couple of weeks, the nefarious minds behind malware and scams have accelerated their plans considerably to take advantage of the situation.
Read More
In this video, Megan Warren interviews Liam Puleo of Bitdefender to discuss what trends he had seen at the Cloud & Cyber Security expo, including Network Traffic Security Analytics.
Read MoreOne of my main focuses from VMworld 2018 in Barcelona was IoT, specifically I was looking to better understand use cases that are going into production, architectures for the ‘things’, gateways, edge computing, data storage and analytics and how to manage, maintain and secure the IoT environment.
You can see some of my thoughts from the sessions I attended in the Doodle below.
Use Cases
IoT use cases are driven by a business or a personal need to analyse data for insight or to monitor something. There were fantastic examples given during VMworld specifically around how IoT was being used in healthcare to help give patients freedom whilst the healthcare workers are still able to ensure their safety and well being.
Infrastructure
The infrastructure for IoT is different depending on the specific use cases, the infrastructure starts with the ‘things’ or the senors. The specific requirement will dictate which sensors and the quantity however usually the sensors will interact with some form of a gateway due to the sensors either being propriety wired or using wireless using WiFi or more commonly a low energy form of wireless connectivity such as bluetooth low energy (BLE) or ZigBee. The gateway is able to aggregate the sensors from the differing forms of connectivity and forward on to the data storage and analytics location.
Depending on the use case you may also require edge computing to provide an element of analytics and decision making at the edge. These edge computing infrastructures will differ depending on the task but VMware are currently working on delivering ESXi on ARM based platforms to allow smaller, affordable but highly available virtual environments for these use cases. >> https://www.theregister.co.uk/2018/08/27/vmware_esxi_ar64/
Security
If you manage to figure out your use case, collect the data with the correct sensors and infrastructure and you are able to get the answers you require with the correct analytics your work still isn’t done. We all know that security in end user computing and IT in general is a major concern, however if you look at the nature of IoT being disparate, involving many connected components and also not being directly monitored (Used) by humans the attack vector for IoT is massive. This is where VMware Pulse comes into play, VMware Pulse aims to be your management plane for your IoT infrastructure, on each of yours sensors or gateways an SDK Python based agent is deployed allowing the Pulse infrastructure to monitor and maintain your ‘things’. Pulse is able to ensure the ‘Things’ are communicating, working within normal parameters and are up to date, think of Workspace UEM (AirWatch) but for IoT.
This is the very beginning of the IoT journey for myself, I would like to further understand the gateway and sensor technology as well as the management of the IoT infrastructure with Pulse. Watch this space as I learn more.
A few weeks back Intel have disclosed details of new vulnerabilities that effect their current and past CPU ranges from at least 2009 up to their latest – so, it would seem, most Intel CPUs in living memory!
Read MoreFollowing on from my previous blog post I wanted to explore in a little more detail precisely how GravityZone protects the end-points it is installed upon.
Read MoreI am currently using Ivanti Patch for Windows Servers to patch our virtual demonstration and test environment and thought I would share a short blog post around some of the common misconfigurations that can be made when setting up the automated patching
Read MoreIn this video, Barry Coombs and George Kenny from Veeam Software talk about the GDPR legislation and what this could potentially mean the IT teams within businesses.
Read MoreA new facility that we now offer here at ComputerWorld is performing Cyber Essentials Assessments for customers. Since customers have a lot of questions about Cyber Essentials, a blog post on the matter should hopefully answer any of those questions that readers may have.
Read Morein 2018 it is my opinion that one of the most important things an IT leader or influencer can do is to have a vision, to develop a strategy and to fully document it.
Read MoreMeeting the tougher new data protection regulation is likely to require additional work and a reduction in options for all businesses.
Read MoreWith the new EU data protection regulation due to come into force, we look at the changes it introduces and how it will affect your business.
Read MoreFor those who haven’t seen anything about this yet, details of two new exploits that could enable malicious code on websites to trick your computer or mobile devices CPU into giving away private information such as website passwords have been made public.
Read MoreToday VMworld 2017 well and truly kicked off with over 11,000 attendees joining VMware in Barcelona for the General Keynote session.
Read MoreYesterday we saw the start of VMware's annual conference, VMworld US. This blog summarises the biggest and best announcements from the 90 minute long presentation.
Read MoreFollow our director Barry Coombs as he attends the VMware Solution Summit in London on July 4th. You will see clips from the event and Barry's thoughts on the content from the day.
Read MoreAlthough ransomware is commonly thought of as something new, it's actually nothing of the sort. Ransomware came to prominence in 2013 when the by now infamous CryptoLocker made an appearance
Read MoreJoin us as we explore the innovative world of Copilot, diving into its various versions, standout features, and the benefits they bring. Consider this episode your guide to integrating Copilot seamlessly into your organisation, equipped with essential tips on data governance and organisation-wide templates.
In this tech-packed conversation, we demystify the intricacies of modern management and unveil the power duo – Microsoft Intune and Windows Autopilot.
The home to all the latest news, innovations, insights and resources from ComputerWorld's crack team of experts and engineers...
In this episode, we're unravelling the mysteries of the latest Microsoft 365: Loop. Join us as we equip you with all the essential details to transform from a Loop novice to a Loop legend.
Join us as we explore the innovative world of Copilot, diving into its various versions, standout features, and the benefits they bring. Consider this episode your guide to integrating Copilot seamlessly into your organisation, equipped with essential tips on data governance and organisation-wide templates.
In this episode, we're unravelling the mysteries of the latest Microsoft 365: Loop. Join us as we equip you with all the essential details to transform from a Loop novice to a Loop legend.