The US Federal Communications Commission has recently reported that "theft of
digital information has become the most commonly reported fraud, surpassing
physical theft." Businesses can do a lot to protect themselves. The FCC
issued a Tip Sheet for small businesses to promote employee security
training, firewalls, securing of WiFis, and more. But for business operating
in (or migrating to) cloud environments; data security, cloud computing
security issues, and challenges take on new meanings and require new
Security in the Cloud: Unique Challenges
In the cloud, data security poses new risks and challenges. We are no longer
concerned just with burglars breaking into our offices to steal computers,
but rather with the data belonging to complete systems deployed to the cloud.
When using public cloud infrastructure like that of AWS, VMware, Microsoft
Sixteen Tips for Moving Your Workloads to the Cloud
Got a plan for your move to the cloud? If you do, you’re in the minority.
According to a recent study, a mere 31 percent of those planning a move to
the cloud actually have a strategy for migrating data and applications. The
To avoid the complexity and cost, we recommend heeding the following advice.
It’s but a fraction of the endless recommendations we received from cloud
experts who offered well-seasoned tips on what to do and not do when you
begin planning to move workloads to the cloud.
1. Have a real reason for... (more)
Every month, we provide an important tip about data security in the cloud. We
have discussed fundamentals like encryption and key management, but for July,
the USA’s month of independence, we would like to discuss our
interdependence between our cloud data security and our employees.
ComputerWeekly recently advised that “teaching employees to be aware of an
organisation’s security requirements can be one of the most effective
ways to enhance the company’s overall security programme.” And yet, in a
Ponemon survey “only 19 percent of the respondents indicated that their
company p... (more)
Cloud Key Management vs. Hardware-Based Key Managers
Cloud security is a top concern for any organization migrating to the cloud.
The threats are many.
For example, the fact your data resides in a shared, multi-tenant environment
is a threat that has become a reality with the latest Xen virtualization
bug, which allowed a malicious fully virtualized server to read data about
other virtualized systems running on the same physical hardware or the
Other threats to cloud security include internal employees and
The consensus is that data encryption is ... (more)
By Lohit Mehta
Every organization should follow a proactive rather than a reactive approach
to protect against threats, risks, and vulnerabilities to which if their IT
infrastructure is exposed can lead to data loss, regulatory penalties,
lawsuits, and damaged reputation. Moving on the same lines, to reduce credit
card fraud via its exposure, a standard known as Payment Card Industry Data
Security Standard (PCI DSS) was formed.
Payment Card Industry Security Standards Council (PCI SSC) had developed a
standard known as PCI Data Security Standard (PCI DSS), which comprises... (more)