MySQL is probably the most popular open source database. While there is a
wealth of discussion online for MySQL database encryption,doing it right in a
cloud computing environment is tricky.
The discussion here is quite long, and contains a lot of interesting details.
So if you want a spoiler: it is possible to achieve true confidentiality for
your MySQL database today; using the industry best practice which is
Cloud encryption for MySQL – Setting your goals
Before talking tech, it’s actually essential to understand what your goals
are, and then how they relate to the technical solution for your MySQL
database. Sometimes it is hard to get transparency when it comes to what
goals are achievable with different techniques.
The classic goals of any information security solution are “CIA”, meaning
Confidentiality: your data cannot be rea... (more)
Disruptive Innovations in Cloud Computing
The global village, mobile devices, online marketplaces, social networks, and
on-demand entertainment all have a part to play. People all over the world
are increasing the time they spend in the virtual world. They’re buying,
selling, sharing, studying, developing apps, hanging out in social networks,
and starting to use digital currencies that bypass traditional banking.
Alongside these community-driven ideas, we are also seeing enormous change in
business to business relationships. Cloud computing enables any size business
to obtain and... (more)
The US Federal Communications Commission has recently reported that "theft of
digital information has become the most commonly reported fraud, surpassing
physical theft." Businesses can do a lot to protect themselves. The FCC
issued a Tip Sheet for small businesses to promote employee security
training, firewalls, securing of WiFis, and more. But for business operating
in (or migrating to) cloud environments; data security, cloud computing
security issues, and challenges take on new meanings and require new
Security in the Cloud: Unique Challenges
In the cloud, data... (more)
We often get requests for best practices related to relational database
security in the context of cloud computing. People want to install their
database of choice, whether it be Oracle, MySQL, MS SQL, or IBM DB2…
This is a complex question but it can be broken down by asking “what’s
new in the cloud?” Many techniques that have existed for ages remain
important, so let’s briefly review database security in general.
Database Security in Context
A database usually does not stand alone; it needs to be regarded in the light
of the environment it inhabits. From the security perspective,... (more)
Porticor, the leading cloud data security company delivering the only
cloud-based data encryption solution that infuses trust into the cloud by
ensuring customer keys are never exposed, today formally launched to make
available the industry’s first solution combining data encryption with
patented key management to protect critical data in public, private and
hybrid cloud environments.
Since Porticor uniquely addresses the fundamental cloud security issue of
data encryption with keys managed in the cloud, companies are now assured
that their private data stored in the cloud acros... (more)