Legal Aspects of Cloud Computing: Cloud Security

June 2, 2018

After GDPR. After the bow wave of GDPR readiness legal work in the run up to 25 May 2018, IT lawyers may be forgiven for thinking that the biggest change is now behind them. But the truth is that GDPR heralds rather than ends a period of change in IT law and regulation as business transforms through the adoption at scale of new technology. Nowhere is this more clearly shown than in the legal aspects of the rapidly developing area of cloud security. 2. Enterprise computing is migrating to the cloud quickly . A central feature of this transformational change is the epic migration now well underway in enterprise (large organisation) computing from ‘on premise’ – traditional IT infrastructure at the user – to ‘in-cloud’ – open access to the public cloud, the more dedicated resources of the private cloud and their hybrid cloud combination.

Spotlight

PGI Cyber

PGI Cyber is an integrated cyber-security solutions provider bringing together a unique capability in the vast field of information security, applicable across the commercial, governmental and institutional sectors.

OTHER WHITEPAPERS
news image

The Economic Impact of Cyber Attacks

whitePaper | December 29, 2022

Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More

Spotlight

PGI Cyber

PGI Cyber is an integrated cyber-security solutions provider bringing together a unique capability in the vast field of information security, applicable across the commercial, governmental and institutional sectors.

Events