Government laws and industry regulations in the United States and around the world mandate protection of sensitive data. Data must be secure when at rest, during transactions and when it transverses network connections. Each industry has specific regulations, which are commonly used in data centers and should be used in the cloud as well. Whether [...]
Cloud encryption is recognized as a basic building block of cloud security. Data at rest is no longer between the proverbial "four walls" of the enterprise; the data owner is managing their own data with browsers and cloud APIs, and the concern is a hacker may do the same.
In this collection of articles, we explore topics such as the risk scenarios; cloud encryption for cloud database security, transparent data encryption in the cloud, integrity protection for cloud data security, and S3 encryption for Amazon Simple Storage Service.
Are you losing sales to prospects who are concerned about PCI and HIPAA compliance? PCI compliance is, of course, crucial for any business which accepts credit cards. HIPAA compliance is required by any business handling Personal Health Information. The total of businesses bound by these two regulations equals a lucrative slice of the market. You cannot [...]
A day doesn’t go by when we don’t hear about sensitive information being exposed or stolen. The culprits could be the government, professional hackers, careless employees with data on mobile devices, or internal employees with unauthorized access to data or unintentional release of data. It seems the wave of data breaches has gained momentum [...]
NSA and Cloud Encryption The firestorm in the press, driven by the Snowden revelations, keeps growing. As the astonishing leaks get published, we discover that the USA’s National Security Agency (NSA) has a full-fledged program in place, spending hundreds of millions of dollars, to tap into Internet communications and get around the encryption that [...]
Cloud Computing – the buzz words of the technology sector this decade: if you’re not already doing it, you’re missing out. Articles have been written. Experts have been crowned. Events have been attended. We all agree – the cloud presents opportunities for cost savings, elasticity, and scalability. But like many new trends, “the cloud” is [...]
We’re excited to announce the release of the Porticor Encryption Agent, our latest addition to the Porticor Virtual Appliance, as part of our continuous efforts to provide flexible deployment options of our encryption and key management solution. With the Porticor Encryption Agent, customers can now encrypt data disks directly on their application server. They can [...]
The Health Insurance Portability and Accountability Act (HIPAA) has been around for many years with the main purpose of governing the use and disclosure of individuals’ health information. The recent dramatic trend of healthcare-driven companies to migrate to cloud computing requires a cloud-specific security approach for HIPAA and the cloud. In this article, I will [...]