Is data security in cloud computing possible in 2014?
Recent reports on NSA spying have eroded trust in US-based cloud providers.
This is especially true for non-USA-based customers that use cloud services
offered by US companies. They see using an American cloud provider as a
risk because they assume their data could be accessed by the NSA and other
government organizations. This perception has caused companies such as
Google, AT&T and Cisco to lose non-US business.
The Snowden leaks spotlighted the risk. The information that was leaked
revealed that some of the biggest cloud providers had their users’ data
accessed by the NSA, including Google and Yahoo. In some cases, this happened
with the companies’ knowledge and in others, without.
The real world results have been that about 10% of companies have canceled
contracts with US cloud providers since these... (more)
The combination of cloud computing and big data is a match made in heaven.
Big data requires a flexible compute environment, which can scale quickly and
automatically to support massive amounts of data. Infrastructure clouds
provide exactly that. But whenever cloud computing is discussed, the question
What about cloud security for big data?
When it comes to cloud security in a big data use case, the expectation is
that any security solution will provide the same flexibility as the cloud
without compromising the overall security of the implementation. When taking
When large enterprises move to a public infrastructure cloud (such as Amazon
Web Services or others), it is a gradual, and often times, carefully measured
process. Large enterprises strive for 100 percent certainty that the
migration process will not impact the business; therefore, they’ll usually
start slowly, by migrating one application or process to the cloud.
This is where hybrid clouds kick in. Hybrid clouds offer (just as their name
insinuates) a hybrid between on-premise and cloud infrastructure. But once
even part of the business is in the cloud, the need arises for cloud... (more)
Last week, at the Amazon Web Services Summit in San Francisco’s Moscone
Center, we met many companies who have deployed (or will migrate) their
sensitive projects to the Amazon cloud. These companies expressed real
concerns about the security of their information, and the status of continued
compliance with regulations like HIPAA and PCI DSS. Below, a summary of the
questions we were asked at the show.
Q. Does Amazon Web Services completely cover cloud security?
Amazon Web Services offers impressive built-in security features like
firewalls, identity and access management, and ... (more)
Data security is at the top of mind for any company that handles payment card
information, and for good reason. The recent hack at Target is a sadly real
example of the damage hackers can cause. Dangers are not limited to hacking,
they can also include employee theft or human error. The Payment Card
Industry Security Standards Council has put together the PCI Data Security
Standard to provide a guideline on how to maintain payment card security.
The standard requires that certain security practices and procedures be put
in place in order to receive compliance to process data. The... (more)