Exponential‐e’s Belfry event marks first year of major Midlands investment

Exponential‐e’s Belfry event marks first year of major Midlands investment

Last month saw Exponential‐e’s inaugural event at the Belfry, bringing together customers and prospects for a morning session exploring the cutting edge of hybrid cloud strategy. Encompassing ideas such as SD‐WAN being used in conjunction with Exponential‐e’s recently launched Cloud Management Platform (CMP), the event was teeming with attendees and conversation led by James Varnish, head of the Midlands team.

Continue reading “Exponential‐e’s Belfry event marks first year of major Midlands investment”

Why technology is vital for future-proofing the broadcast and media industry

Why technology is vital for future-proofing the broadcast and media industry

Today, innovation in technology is changing the way digital media is consumed more quickly than ever before. Tech-savvy consumers are creating an ever-growing market for data-intensive HD and UHD content, consuming content online, on the move and on-demand.

Continue reading “Why technology is vital for future-proofing the broadcast and media industry”

A double-whammy of awards nominations for our cloud offerings

A double-whammy of awards nominations for our cloud offerings

At this point, to say that technology has transformed every aspect of our personal and working lives is a bit redundant. What’s more interesting is to take a deep dive into the infrastructure that’s underpinned modern innovation as we know it. And that infrastructure, more often than not, has been cloud.

Consider the key technological achievements that have made the past decade so memorable: self-driving cars, streaming services, digital healthcare that helps people live longer, crowdfunding and cryptocurrencies. All have been powered by cloud computing.

With the importance of cloud in mind, we are delighted to announce that Exponential-e’s reputation for cloud excellence was recognised last weekend by not one but two key awards ceremonies: the CRN Channel Awards and the IAB BaM™ Awards 2018.

Continue reading “A double-whammy of awards nominations for our cloud offerings”

Cyber security expertise and the global skills gap

Cyber security expertise and the global skills gap

By 2019, 1 to 2 million roles within cyber security will be unfulfilled. That’s a figure that should strike fear into the heart of even the most stoic of business people. The threat of cyberattacks is growing quickly, and there aren’t enough skilled people in place to control the wildfire.

This global cyber security skills crisis isn’t exactly a new problem, though. Over the last 2 years, 40% of cyber security roles remained unfulfilled, despite an increase in job postings of over 74%. This is a problem, then, that’s been smouldering in the background for a long time, and consequently now has the potential to create some serious destruction.

Continue reading “Cyber security expertise and the global skills gap”

Multi-cloud and security challenges

Abstract 3D clouds on blue sky background

76% of organisations are implementing the cloud or already operating in it. And no wonder: Cloud can do great things for your organisation. It can provide increased data storage capacity, improved business continuity, and potential cost reduction. However, using the cloud brings significant security risks with it, including data loss and threats to data privacy. Continue reading “Multi-cloud and security challenges”

The changing faces of security

The changing faces of security

Cyber security is more complex now than ever before, and the implications of a cyber-attack can be much more disastrous. Organisations must consider not only the financial implications but the reputational damage that can arise following an attack. The proliferation of social platforms and the increasing needs of regulation, mean that security breaches can be publicised across the globe within minutes. Whilst the cost of launching a cyber-attack has reduced over the last few years, the cost of defence has risen. This is because there’s a greater variety of attack vectors – means by which an attacker can gain access to your network. The methods deployed are so vast, compared to previously, that it makes it increasingly difficult to build an effective defence against. Highly sophisticated cyber-attacks are also using automation techniques to maximise their damage, to the extent where one piece of code can be used many thousands of times.

Continue reading “The changing faces of security”

The office kettle and your security estate

The office kettle and your security estate

The adoption and proliferation of the Internet of Things (IoT) is unstoppable. Even though we have had massive DDoS attacks orchestrated using IoT, IP enabled CCTV Devices have been compromised and marshalled into a bot army of significant breadth and size; even though the implication of poor or shared cryptography of these IoT devices is well documented and a fantastic risk to any user/owner of these devices they are still being adopted.

Continue reading “The office kettle and your security estate”