Your business’s value add is tied into an application that was custom built for you. It encapsulates many of your values and competitive advantages. Due to its sensitive nature, you have resisted taking it to the cloud. But you also understand the cloud benefits and know that moving your most sensitive value adding applications to […]
Cloud encryption is recognized as a basic building block of cloud security. Data at rest is no longer between the proverbial "four walls" of the enterprise; the data owner is managing their own data with browsers and cloud APIs, and the concern is a hacker may do the same.
In this collection of articles, we explore topics such as the risk scenarios; cloud encryption for cloud database security, transparent data encryption in the cloud, integrity protection for cloud data security, and S3 encryption for Amazon Simple Storage Service.
from InfoQ.com: With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security. As CIO, protecting your data (and your users) is one of your key […]
I am often asked by skeptics, cynics, doubters, and readers of sensational journalism if they can trust the cloud. Sure, there have been data leaks, hacker intrusions, NSA spies, but can the cloud be trusted with your data? YES End of article. Not really . . . yes, the cloud can definitely be trusted, but […]
February is upon us and with it, the pink, the red, the chocolate, and the teddy bears of Valentine’s Day. Though love is in the air, at least at retail establishments throughout the country, a recent data breach of Cupid Media’s dating site reminds us that we must remain adamant about protecting ourselves, our data, […]
Cloud computing changes the way companies consume IT resources. It shifts the burden of purchasing and maintaining IT infrastructure to specialized IT providers and allows the users to pay only for the resources they need, when they need them. In this new paradigm, cloud security is a top concern. Companies want to reap the benefits […]
Happy New Year, friends and colleagues. As we embark on this new journey of a cloud security tip each month, we are overwhelmed by the news of the recent Target data breach during the busy holiday shopping season, which affected 70 million customers, whose credit/debit card information, personal names, mailing addresses, phone numbers or email […]
We recently spoke at UP 2013. The conference was focused on Healthcare in the cloud, and we spoke about achieving Safe Harbor – which is (perhaps surprisingly) a well defined concept, courtesy of the Health and Human Services administration. At the end of the day, it means that even if bad things happen, you can […]