The US Federal Communications Commission has recently reported that "theft of
digital information has become the most commonly reported fraud, surpassing
physical theft." Businesses can do a lot to protect themselves. The FCC
issued a Tip Sheet for small businesses to promote employee security
training, firewalls, securing of WiFis, and more. But for business operating
in (or migrating to) cloud environments; data security, cloud computing
security issues, and challenges take on new meanings and require new
Security in the Cloud: Unique Challenges
In the cloud, data security poses new risks and challenges. We are no longer
concerned just with burglars breaking into our offices to steal computers,
but rather with the data belonging to complete systems deployed to the cloud.
When using public cloud infrastructure like that of AWS, VMware, Microsoft
Sixteen Tips for Moving Your Workloads to the Cloud
Got a plan for your move to the cloud? If you do, you’re in the minority.
According to a recent study, a mere 31 percent of those planning a move to
the cloud actually have a strategy for migrating data and applications. The
To avoid the complexity and cost, we recommend heeding the following advice.
It’s but a fraction of the endless recommendations we received from cloud
experts who offered well-seasoned tips on what to do and not do when you
begin planning to move workloads to the cloud.
1. Have a real reason for... (more)
Disruptive Innovations in Cloud Computing
The global village, mobile devices, online marketplaces, social networks, and
on-demand entertainment all have a part to play. People all over the world
are increasing the time they spend in the virtual world. They’re buying,
selling, sharing, studying, developing apps, hanging out in social networks,
and starting to use digital currencies that bypass traditional banking.
Alongside these community-driven ideas, we are also seeing enormous change in
business to business relationships. Cloud computing enables any size business
to obtain and... (more)
Newest Virtual Private Data System Leverages Software-Defined Key Management
to Enhance Security and Cloud Data Protection across OpenStack and VMware
CAMPBELL, Calif. – Nov. 4, 2014 – Porticor®, a leading cloud data
security company delivering the only cloud-based key management and data
encryption solution that infuses trust into the cloud and keeps cloud data
confidential, today announced that its latest Porticor Virtual Private Data
(VPD) release supports the OpenStack cloud operating system, securing
datacenter information across compute, storage, and networking... (more)
By Lohit Mehta
Every organization should follow a proactive rather than a reactive approach
to protect against threats, risks, and vulnerabilities to which if their IT
infrastructure is exposed can lead to data loss, regulatory penalties,
lawsuits, and damaged reputation. Moving on the same lines, to reduce credit
card fraud via its exposure, a standard known as Payment Card Industry Data
Security Standard (PCI DSS) was formed.
Payment Card Industry Security Standards Council (PCI SSC) had developed a
standard known as PCI Data Security Standard (PCI DSS), which comprises... (more)