Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data security poses new risks and challenges. We are no longer concerned just with burglars breaking into our offices to steal computers, but rather with the data belonging to complete systems deployed to the cloud. When using public cloud infrastructure like that of AWS, VMware, Microsoft Azure... (more)

The Benefits of Software-Defined Security by @Porticor | @CloudExpo [#Cloud]

The Benefits of Software-Defined Security At Gartner’s Security & Risk Management Summit, analysts identified 2014’s Top 10 Technologies for Information Security. They singled out software-defined security as a trend to watch, stating that because its “impact on security will be transformational.” Read the full article at Information Security Buzz. ... (more)

Security Issues in Cloud Computing By @GiladPN | @CloudExpo

Security Issues in Cloud Computing: Porticor’s AWS Experts Discuss In a recent webinar, Porticor’s AWS cloud security experts took on the security challenges companies face when migrating to AWS (and other IaaS clouds) and offered alternatives that enable IT Directors to take advantage of the cloud, while maintaining control of their data and its security. Security Issues in Cloud Computing: Are you a TARGET? We are all familiar with the infamous Target hack, which saw bad guys accessing Target’s payment systems through access granted to an HVAC subcontractor, and accessing paymen... (more)

Cloud Security – Implementing a Secure Cloud Backup Case Study

Secure cloud backup is a scenario which increasingly gains traction. It allows organizations to implement an off-site backup while maintaining costs at a minimum. In this blog post I would like to focus on a specific use case of secure cloud backup. The system we describe is comprised of an on-premise replication server, Porticor Cloud Security, and Amazon S3 as the final backup destination, all integrated by one of our fine cloud integrators. Secure Cloud Backup – The Business Need In this use case, an enterprise organization was struggling with an inefficient and costly offsite... (more)

Hardware-Based Key Managers By @GiladPN | @CloudExpo [#Cloud]

Cloud Key Management vs. Hardware-Based Key Managers Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fully virtualized server to read data about other virtualized systems running on the same physical hardware or the hypervisor). Other threats to cloud security include internal employees and even governments. The consensus is that data encryption is ... (more)