By Lohit Mehta
Every organization should follow a proactive rather than a reactive approach
to protect against threats, risks, and vulnerabilities to which if their IT
infrastructure is exposed can lead to data loss, regulatory penalties,
lawsuits, and damaged reputation. Moving on the same lines, to reduce credit
card fraud via its exposure, a standard known as Payment Card Industry Data
Security Standard (PCI DSS) was formed.
Payment Card Industry Security Standards Council (PCI SSC) had developed a
standard known as PCI Data Security Standard (PCI DSS), which comprises 12
core security areas to protect credit card holder data from theft, misuse,
etc. These requirements apply to all entities involved in payment card
processing, including merchants, processors, and 3rd party service providers
that store, process and transmit cardholder data. PCI DSS origina... (more)
The US Federal Communications Commission has recently reported that "theft of
digital information has become the most commonly reported fraud, surpassing
physical theft." Businesses can do a lot to protect themselves. The FCC
issued a Tip Sheet for small businesses to promote employee security
training, firewalls, securing of WiFis, and more. But for business operating
in (or migrating to) cloud environments; data security, cloud computing
security issues, and challenges take on new meanings and require new
Security in the Cloud: Unique Challenges
In the cloud, data... (more)
We often get requests for best practices related to relational database
security in the context of cloud computing. People want to install their
database of choice, whether it be Oracle, MySQL, MS SQL, or IBM DB2…
This is a complex question but it can be broken down by asking “what’s
new in the cloud?” Many techniques that have existed for ages remain
important, so let’s briefly review database security in general.
Database Security in Context
A database usually does not stand alone; it needs to be regarded in the light
of the environment it inhabits. From the security perspective,... (more)
Top Executive: Gilad Parann-Nissany, Founder & CEO
Porticor’s Virtual Private Data system combines encryption with key
management to protect data in public, private and hybrid cloud environments.
With split-key encryption technology, Porticor Virtual Private Data ensures
keys remain under customer control and are never exposed in storage.
See the list here.
The post Emerging Vendors 2013: Security Vendors appeared first on Porticor
The combination of cloud computing and big data is a match made in heaven.
Big data requires a flexible compute environment, which can scale quickly and
automatically to support massive amounts of data. Infrastructure clouds
provide exactly that. But whenever cloud computing is discussed, the question
What about cloud security for big data?
When it comes to cloud security in a big data use case, the expectation is
that any security solution will provide the same flexibility as the cloud
without compromising the overall security of the implementation. When taking