Market research firm IDC forecasts a 50% increase in revenues from the sale of big data and business analytics software, hardware, and services between 2015 and 2019. Services will account for the biggest chunk of revenue, with banking and manufacturing-led industries poised to spend the most.
Data is the driving force underlying market disrupters such as ride-sharing service Uber. Data and analytic projects dominated the top of InformationWeek's Elite 100 list in 2016. So it's no surprise that IDC's most recent forecast for the big data and business analytics market shows significant revenue growth for the next five years.
IDC predicts revenue from the sales of big data and business analytics applications, tools, and services will increase more than 50%, from nearly $122 billion in 2015 to more than $187 billion in 2019. The analyst firm estimates revenue by technology, industry, and geography in its Worldwide Semiannual Big Data and Analytics Spending Guide.
Let’s be honest: PCI DSS compliance is viewed as a pain in the neck. It is seen by management in many companies as a big fire drill to check the compliance box, but without real business value. They see the scramble to test, remediate and report to achieve compliance, but they often cannot connect it to improvements in their actual security posture. The lack of perceived value is the result of the prevalent “compliant but not secure” mode of operation.
The fire drill typically includes the following scenario: A large company with tens or hundreds of legacy systems, some of which store its most valuable information, is tasked with complying with PCI DSS requirements and validating compliance in quarterly tests and annual audits. The systems are siloed, owned by different line-of-business and application owners, sometimes with their own IT and security experts. Each application and associated infrastructure needs to be tested, scanned or otherwise validated to be in compliance. To minimize potentially negative impact on business critical applications, testing and scanning needs to be coordinated and scheduled with application owners. Results need to be communicated to those same owners and coordinated with IT administrators to apply the fix. After the fix is finally applied, the scans and tests need to be repeated to verify the exposure no longer exists. All of this information exchanging hands starts out in vulnerability scanning and governance, risk management and compliance tools, but most often ends up in spreadsheets and emails. Multiply those spreadsheets and emails by the number of components and stakeholders, and it is easy to see why the process overtakes the intended objective of cardholder data protection.
Data breaches are now a fact of life. Regardless of the size of your business, or the sector you operate in, sooner or later you should expect to come under attack by hackers.
In the past couple of years, there’s been a steady stream of high-profile attacks on companies around the world, from retailers to banks and healthcare providers. And if smaller firms think they will be overlooked by hackers in the belief they are not a valuable target, they are mistaken.
Published: Tuesday, 24 May 2016 07:55
The Business Continuity Institute’s Middle East business continuity and resilience Awards took place on Monday 23rd May 2016 in Abu Dhabi.
The winners were:
Continuity and Resilience Newcomer 2016
Pauline Kolset CBCI, Administration Manager, Risk Management, Jumeirah Group
Continuity and Resilience Consultant 2016
Tom Keegan FBCI, Enterprise Resilience Leader, Control Risks
Continuity and Resilience Professional (private Sector) 2016
Abdullah Alrebdi AMBCI, Business Continuity Senior Analyst, Saudi Stock Exchange (Tadawul)
Continuity and Resilience Professional (Public Sector) 2016
Mahmoud Abu Farha MBCI, Head of Business Continuity Management, Palestine Monetary Authority
Continuity and Resilience Team 2016
Roads and Transport Authority Crisis Management Team
Continuity and Resilience Provider (Service/Product) 2016
Deloitte and Touche, Resiliency and Continuity Services (RCS)
Continuity and Resilience Innovation 2016
Estmrarya Academy ‘Learn and be more Resilient’
Most Effective Recovery 2016
Commercial International Bank - Egypt
Industry Personality 2016
Fatima Azeem AMBCI, Executive Officer in Business Continuity, National Emergency Crisis & Disaster Management Authority
Ransomware has become such a prevalent threat that the Los Angeles Times suggested in a March 8 article that “2016 is shaping up as the year of ransomware.”
Recent ransomware victims, the paper reported, included the Los Angeles County Department of Health Services and Hollywood Presbyterian Medical Center, which paid $17,000 to regain access to a communications system that attackers had shut down.
Ransomware is ingeniously simple to execute and, as such, an effective method for cybercriminals to monetize malware attacks. Ransomware uses malware variants with names like “Locky” and “CryptoWall” to encrypt files in victims’ systems. The malware typically is delivered through phishing emails.
Crises don’t discriminate. Whether they are economic, geopolitical, technological or environmental, you can expect to have to deal with a major one soon. And how well you minimize the impact of that crisis is the difference between achieving your business objectives, and completely missing them, disappointing your customers, employees, partners, and shareholders in the process. Lucky for you (if you believe in luck and not the probability of chance events), Forrester’s risk experts have updated The Governance, Risk, And Compliance Playbook For 2016. I also recently finished a series of reports on the state of business continuity (which I have creatively named part 1, part 2, and part 3) to give you a jump start on your GRC efforts. Below, I’ve highlighted some of our most recent and exciting GRC research:
All-flash storage systems are about to spark a renaissance within the data center. Until very recently, the higher costs of all-flash storage has prevented the technology from being adopted across a majority of data center workloads. However, the recent introduction of high-density flash will certainly change this situation, as the ability to mix high density with traditional flash in a real-time auto-tiering manner will dramatically reduce the cost of flash, enabling its broader use for all workloads across the data center.
Flash is still uncharted territory for many data center executives. As the use of all-flash becomes more common, it will be more important than ever to know how to assess key performance parameters and assess any cost challenges encountered along the way.
(TNS) - A lone gunman is in the building, multiple people have been injured and the suspect is armed with semi-automatic handguns and extra ammunition. It’s up to law enforcement and emergency responders to evacuate the injured and subdue the gunman – all at the same time.
That’s the scenario that played out at UC Merced on Saturday morning as multiple Merced County law enforcement and emergency response agencies trained together on protocol and response for violent incidents.
About 50 role-players acted as student witnesses and victims while paramedics and firefighters teamed up with police officers and deputies.
(TNS) - Tropical storm and hurricane season kicks off June 1, so it's not too early to get ready.
That was the message federal, state and local emergency planners delivered last week during Hurricane Preparedness Week.
The message is simple: Be prepared.
This year's season, from June 1 through Nov. 30, could be more active than those the past couple of years, experts say.
Partnership offers immediate ‘lift and shift’ of any Windows-based applications to the cloud for faster customer on-boarding
LONDON, UK – Cloud application virtualization provider, Cloudhouse Technologies and cloud workspace provider, Cloud DC, today announced a partnership to on-board applications to the Cloud DC workspace. Both companies are committed to delivering apps, anytime, anywhere and on any device. By partnering, Cloud DC will use Cloudhouse’s Applications Anywhere solution to deliver business critical applications, regardless of device, operating system, or even where data is stored, on its virtual hosted Workspace platform.
Steve Robinson, CEO at Cloud DC said, “We are focused on empowering companies to take advantage of cloud services delivering the apps users want instead of full desktop deployments. Our customers just want apps made available to their users. However, often the biggest challenge in getting customers to this model is taking legacy or browser based apps to the cloud. With Cloudhouse, we can now get our customers to the cloud with their business critical apps regardless of any dependencies.”
Mat Clothier, Founder and CTO at Cloudhouse said, “Many of the business critical apps in use today have been built on legacy systems and have dependencies on outdated operating systems or browsers. Cloudhouse Applications Anywhere allows Cloud DC to take any classic Windows bespoke, browser based or desktop application to the Cloud DC Workspace platform. Our technology will enable Cloud DC customers to benefit from cloud services faster.”
Closely aligned with Microsoft and Citrix, the partnership will help customers overcome any challenges getting legacy apps to the cloud and enhances the cloud based delivery and management of applications in a way that enables Cloud DC to streamline application management in XenApp servers and/or images. Cloud DC delivers apps to their customers using full Citrix Reference Architecture on AWS, with Azure backup.
Cloud DC now can package apps once and reuse everywhere across a customer’s Workspace deployment, enabling them to take their entire office IT environment anywhere, anytime, and on any device.
About Cloud DC
Cloud DC is a born in the cloud company, with its flagship Cloud DC Workspace platform. Originally based in Australia, Cloud DC has expanded headquarter operations and sales offices to Austin, London and San Diego. The mission of Cloud DC is to be premier global cloud service provider of choice to business, delivering a cloud based Workspace platform through Distribution and Reseller channels.
Learn more at www.clouddcinc.com
Cloudhouse Technologies Limited is reinventing application deployment and management. Our technology transports any classic Windows bespoke, browser based or desktop application to the latest operating platforms and/or the Cloud. It’s a frictionless approach, with no re-coding of existing software. Release your applications and securely and safely deploy. Anywhere. On any device.
Cloudhouse make it happen www.cloudhouse.com.