Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

By Lohit Mehta Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines, to reduce credit card fraud via its exposure, a standard known as Payment Card Industry Data Security Standard (PCI DSS) was formed. History Payment Card Industry Security Standards Council (PCI SSC) had developed a standard known as PCI Data Security Standard (PCI DSS), which comprises 12 core security areas to protect credit card holder data from theft, misuse, etc. These requirements apply to all entities involved in payment card processing, including merchants, processors, and 3rd party service providers that store, process and transmit cardholder data. PCI DSS origina... (more)

Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data... (more)

Database Security in the Cloud

We often get requests for best practices related to relational database security in the context of cloud computing. People want to install their database of choice, whether it be Oracle, MySQL, MS SQL, or IBM DB2… This is a complex question but it can be broken down by asking “what’s new in the cloud?” Many techniques that have existed for ages remain important, so let’s briefly review database security in general. Database Security in Context A database usually does not stand alone; it needs to be regarded in the light of the environment it inhabits. From the security perspective,... (more)

Emerging Vendors 2013: Security Vendors

Porticor Tel Aviv Top Executive: Gilad Parann-Nissany, Founder & CEO Porticor’s Virtual Private Data system combines encryption with key management to protect data in public, private and hybrid cloud environments. With split-key encryption technology, Porticor Virtual Private Data ensures keys remain under customer control and are never exposed in storage. See the list here.   The post Emerging Vendors 2013: Security Vendors appeared first on Porticor Cloud Security. ... (more)

Four Great Tips: Cloud Security for Big Data

The combination of cloud computing and big data is a match made in heaven. Big data requires a flexible compute environment, which can scale quickly and automatically to support massive amounts of data. Infrastructure clouds provide exactly that. But whenever cloud computing is discussed, the question comes up: What about cloud security for big data? When it comes to cloud security in a big data use case, the expectation is that any security solution will provide the same flexibility as the cloud without compromising the overall security of the implementation. When taking your... (more)