Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

MySQL is probably the most popular open source database. While there is a wealth of discussion online for MySQL database encryption,doing it right in a cloud computing environment is tricky. The discussion here is quite long, and contains a lot of interesting details. So if you want a spoiler: it is possible to achieve true confidentiality for your MySQL database today; using the industry best practice which is split-key encryption. Here’s why. Cloud encryption for MySQL – Setting your goals Before talking tech, it’s actually essential to understand what your goals are, and then how they relate to the technical solution for your MySQL database. Sometimes it is hard to get transparency when it comes to what goals are achievable with different techniques. The classic goals of any information security solution are “CIA”, meaning Confidentiality: your data cannot be rea... (more)

Making the Cloud a Little Safer for Healthcare

We’ve touched on cloud security risks here on the Ananova blog in the past. In case you missed any of the articles, here’s a quick fact: cloud hosting is just as risky as traditional hosting. While it may seem as if it is more vulnerable to hacker attacks, that is just simply not true. It’s all in the way you store your data, and the strength of the password that protects it. When you turn to cloud hosting for the healthcare industry, it becomes even more important to follow best practices. You don’t want the medical records, social security numbers, imaging files like x-rays and ... (more)

Disruptive Innovations and the 'Internet of Things' | @ThingsExpo [#IoT]

Disruptive Innovations in Cloud Computing The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in social networks, and starting to use digital currencies that bypass traditional banking. Alongside these community-driven ideas, we are also seeing enormous change in business to business relationships. Cloud computing enables any size business to obtain and... (more)

@CloudExpo | PCI-DSS Encryption Requirements

Significant money is at stake and in need of protection in the Payment Card Industry (PCI). The global payment card industry covers several sectors: banks and financial institutions (acquirers), issuers, processors, service providers, merchants carrying out transactions online and via point of sale terminals in bricks and mortar stores, large and small. PCI Security The PCI Security Organization’s Data Security Standard (DSS) applies to your business if you store, process or transmit cardholder data (CHD). The PCI supply chain is not an isolated entity. It needs to protect itself ... (more)

Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data... (more)