In a post Snowden world it is clear that for cloud data security, we need
strong encryption. When properly implemented, encryption in the cloud reduces
risk to levels acceptable for sensitive data.
There is no doubt data protection in the cloud computing era is never going
to be a ‘one size fits all’ kind of a solution. It requires a 360-degree
view of the company with 365-days a year dedication.
The best place to start is with a risk analysis so you know what kind of data
you have, its levels of sensitivity, who’s using it, where it’s used and
stored, and how and where and over what technologies it’s going to
‘commute’. You need to understand your company’s data – in terms of
technology and human weaknesses. Data should be unreadable to an attacker. It
must be incoherent at all times to anyone other than you and your trusted
personnel: while it’s travelling – or yo... (more)
Disruptive Innovations in Cloud Computing
June 23, 2014
The global village, mobile devices, online marketplaces, social networks, and
on-demand entertainment all have a part to play. People all over the world
are increasing the time they spend in the virtual world. They’re buying,
selling, sharing, studying, developing apps, hanging out in social networks,
and starting to use digital currencies that bypass traditional banking.
Alongside these community-driven ideas, we are also seeing enormous change in
business to business relationships. Cloud computing enables any size business ... (more)
Cloud Security Breaches and How to Avoid Them
The cloud is expanding. More applications are being run online. More data is
being stored online. More businesses are relying on public, private, and
hybrid clouds for their apps, records, and backups. And more hackers are
Why Security Breaches Happen in the Cloud
Hackers aren’t attacking the cloud; the cloud is their access point to
attack your business. CIO.com found that 85% of IT professionals are
confident in the cloud provider’s ability to provide a secure environment.
CompTIA’s Annual Information Security Tre... (more)
By Lohit Mehta
Every organization should follow a proactive rather than a reactive approach
to protect against threats, risks, and vulnerabilities to which if their IT
infrastructure is exposed can lead to data loss, regulatory penalties,
lawsuits, and damaged reputation. Moving on the same lines, to reduce credit
card fraud via its exposure, a standard known as Payment Card Industry Data
Security Standard (PCI DSS) was formed.
Payment Card Industry Security Standards Council (PCI SSC) had developed a
standard known as PCI Data Security Standard (PCI DSS), which comprises... (more)
Security Issues in Cloud Computing: Porticor’s AWS Experts Discuss
In a recent webinar, Porticor’s AWS cloud security experts took on the
security challenges companies face when migrating to AWS (and other IaaS
clouds) and offered alternatives that enable IT Directors to take advantage
of the cloud, while maintaining control of their data and its security.
Security Issues in Cloud Computing: Are you a TARGET?
We are all familiar with the infamous Target hack, which saw bad guys
accessing Target’s payment systems through access granted to an HVAC
subcontractor, and accessing paymen... (more)