Cloud

UK government’s M365 use under scrutiny after Microsoft’s ‘no guarantee of sovereignty’ disclosure

The dominant hold that Microsoft has on government IT is coming under close scrutiny, following the software giant’s disclosure it cannot guarantee the sovereignty of UK policing data hosted within its hyperscale cloud infrastructure. As exclusively revealed by Computer Weekly on 19 June, Microsoft has advised Scottish policing bodies it cannot guarantee that data hosted…

UK government’s M365 use under scrutiny after Microsoft’s ‘no guarantee of sovereignty’ disclosure Read More »

EU chief slams Apple’s decision not to launch AI on iPhones in Europe

Ahead of Apple’s iOS 18 beta 2 release early this week, the company announced it doesn’t plan to bring Apple Intelligence and certain other iOS 18 features to Europe due to regulatory fears. In a statement issued at the time, Apple said: “We are concerned that the interoperability requirements of the DMA could force us…

EU chief slams Apple’s decision not to launch AI on iPhones in Europe Read More »

Police Scotland did not consult ICO about high-risk cloud system

Police Scotland chose not to consult the data regulator before deploying its cloud-based digital evidence-sharing system, despite identifying a number of “high risks” with the data processing, freedom of information (FOI) disclosures have revealed. The disclosures also show that although the Information Commissioner’s Office (ICO) had previously been informed of the risks and acknowledged them,…

Police Scotland did not consult ICO about high-risk cloud system Read More »

True cloud security requires in-depth understanding

As with most endeavours, incorporating security into the process as early as possible is essential when building or migrating to technologies such as the cloud. Whether you are beginning your journey of migrating key services to the cloud or launching a cloud-native evergreen project, involving security specialists with a deep understanding of the cloud security…

True cloud security requires in-depth understanding Read More »

No, Apple isn’t limiting AI availability to get you to buy a new iPhone

When Apple announced Apple Intelligence, the company’s new artificial intelligence technology that gives Siri a boost and powers a number of new features across the iPhone, iPad, and Mac, it also revealed that the technology would only be available on certain models. At launch, Apple Intelligence will only be available on the following iPhones, iPads,…

No, Apple isn’t limiting AI availability to get you to buy a new iPhone Read More »

RCE flaw and DNS zero-day top list of Patch Tuesday bugs

A critical remote code execution (RCE) vulnerability in Microsoft Message Queuing (MSMQ) stands out as the most serious issue patched by Microsoft in its June Patch Tuesday update, amid another lighter-than-usual drop comprising just over 50 issues. Tracked as CVE-2024-30080, and attributed to China-based researcher k0shl, the flaw enables a remote, unauthenticated party to execute…

RCE flaw and DNS zero-day top list of Patch Tuesday bugs Read More »

CMA working paper outlines concerns about Microsoft’s competitive hold on UK cloud market

The interim findings of the Competition and Markets Authority’s (CMA’s) investigation into Microsoft’s cloud software licensing strategy should be a significant cause for concern for the software giant, experts have warned. However, Microsoft maintains its behaviour is having no impact on its nearest competitors, Amazon Web Services (AWS) and Google Cloud. The UK competition watchdog…

CMA working paper outlines concerns about Microsoft’s competitive hold on UK cloud market Read More »

How to ensure public cloud services are used safely and securely

By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data storage, and virtual machines to be accessed remotely and on demand. While largely a benefit, it also leaves organisations open to public cloud security risks, particularly when they allow users to access on-demand services from…

How to ensure public cloud services are used safely and securely Read More »

VMware/Broadcom: Prepare for legacy support

Broadcom’s $69bn acquisition of VMware last year follows on from a number of smaller but significant software acquisitions the company has made over the past few years. These all appear to point to the company’s appetite to develop a software business built on acquiring the customers of these businesses. In 2018, Broadcom acquired CA Technologies.…

VMware/Broadcom: Prepare for legacy support Read More »

Best practices to beat container misconfiguration

While misconfigured containers are a major challenge in cloud security, this can often be traced to shortcuts to cloud and containerisation divorced from the overall strategy. Focus on technical and tactical migrations, or even managing revenues, can be to the detriment of risk management and business results, with Drew Firment, chief cloud strategist at learning…

Best practices to beat container misconfiguration Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top