Healthcare’s Cybersecurity Radiography: Only One in Six Organizations Can Detect Advanced Threats

|
The healthcare sector has to store increasing quantities of personally identifiable and sensitive information, making it one of the most attractive targets for data theft. However, according to EY’s Global Information Security Survey 2018-2019, the sector’s awareness of cyber risks is growing, and many organizations are determined to put stronger ... Read More

Here Comes 5G—What are the Data Security Implications?

|
Organizations and consumers alike are eagerly anticipating the arrival of 5G, the latest generation of cellular mobile communications. But perhaps IT and security executives need to be thinking about the potential security implications ... Read More

Ensuring Strong Cyber Security at the Edge

|
We’re hearing more and more about edge computing, and it will likely continue to be a focal point within IT as the Internet of Things (IoT) continues to gain momentum. A key question for organizations looking to the edge: What are the cyber security implications? ... Read More

Security is a Critical Factor in Determining where Enterprises Will Run Their Application

|
Some 71% of CISOs rank data security and compliance as the most important factor when choosing where to put their application workloads, according to a recent survey by Nutanix ... Read More

Hybrid Clouds Bring New Complexities—and Security Risks

|
Building a hybrid cloud environment can provide a host of benefits for organizations, including a level of flexibility and agility not possible with a traditional on-premise data center infrastructure. But it can also create complexities that can lead to increased risk for enterprises ... Read More

Healthcare Continues to Be Prime Target for Cyber Attacks

|
Few industries today are faced with as many cyber security threats as the healthcare sector. Patient data is among the most sensitive information in the digital ecosystem, and cyber criminals are often looking to leverage these resources for profit ... Read More

Corporate Boards Navigate New Data Privacy Regulations, Digital Transformation and Cyber Security Risks

|
Anyone who takes part in a corporate board of directors meeting these days is likely to hear conversations about cyber security and regulatory compliance. These areas have become so critical to the risk management strategies of organizations that they can’t be ignored by the very people responsible for guiding businesses ... Read More

Building a Multi-Cloud Strategy? Be Sure to Address the Security and Management Challenges

|
Many organizations today are adopting a multi-cloud strategy, using services from several cloud providers and deploying offerings such as software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) to meet a variety of business needs ... Read More

Small Companies, Big Security Concerns

|
Many people might tend to associate security breaches and malware attacks with large enterprises. After all, the attacks that grab the big headlines generally occur against global companies or large governmental organizations ... Read More

Join us at .NEXT London to discuss survival in HCI

|
“Survival” is usually associated with stoically pushing on through harsh conditions, symbolized by people like this year’s Nutanix .NEXT keynote speakers -- Bear Grylls and Jane Goodall. But, as technology weaves ever more tightly into our daily lives to support mobility and improve life quality, the term “survival” is also ... Read More

Secure Guardrails