Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

MySQL is probably the most popular open source database. While there is a wealth of discussion online for MySQL database encryption,doing it right in a cloud computing environment is tricky. The discussion here is quite long, and contains a lot of interesting details. So if you want a spoiler: it is possible to achieve true confidentiality for your MySQL database today; using the industry best practice which is split-key encryption. Here’s why. Cloud encryption for MySQL – Setting your goals Before talking tech, it’s actually essential to understand what your goals are, and then how they relate to the technical solution for your MySQL database. Sometimes it is hard to get transparency when it comes to what goals are achievable with different techniques. The classic goals of any information security solution are “CIA”, meaning Confidentiality: your data cannot be rea... (more)

Disruptive Innovations and the 'Internet of Things' | @ThingsExpo [#IoT]

Disruptive Innovations in Cloud Computing The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in social networks, and starting to use digital currencies that bypass traditional banking. Alongside these community-driven ideas, we are also seeing enormous change in business to business relationships. Cloud computing enables any size business to obtain and... (more)

Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data... (more)

Database Security in the Cloud

We often get requests for best practices related to relational database security in the context of cloud computing. People want to install their database of choice, whether it be Oracle, MySQL, MS SQL, or IBM DB2… This is a complex question but it can be broken down by asking “what’s new in the cloud?” Many techniques that have existed for ages remain important, so let’s briefly review database security in general. Database Security in Context A database usually does not stand alone; it needs to be regarded in the light of the environment it inhabits. From the security perspective,... (more)

Porticor Launches To Deliver Cloud Data Security

Porticor, the leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud by ensuring customer keys are never exposed, today formally launched to make available the industry’s first solution combining data encryption with patented key management to protect critical data in public, private and hybrid cloud environments. Since Porticor uniquely addresses the fundamental cloud security issue of data encryption with keys managed in the cloud, companies are now assured that their private data stored in the cloud acros... (more)