Welcome!

Every Cloud needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data security poses new risks and challenges. We are no longer concerned just with burglars breaking into our offices to steal computers, but rather with the data belonging to complete systems deployed to the cloud. When using public cloud infrastructure like that of AWS, VMware, Microsoft Azure... (more)

Sixteen Tips for Moving Your Workloads to the Cloud By @GiladPN | @CloudExpo [#Cloud]

Sixteen Tips for Moving Your Workloads to the Cloud Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t. To avoid the complexity and cost, we recommend heeding the following advice. It’s but a fraction of the endless recommendations we received from cloud experts who offered well-seasoned tips on what to do and not do when you begin planning to move workloads to the cloud. 1. Have a real reason for... (more)

Train Employees about Cloud Data Security: July’s Cloud Security Tip of the Month

Every month, we provide an important tip about data security in the cloud. We have discussed fundamentals like encryption and key management, but for July, the USA’s month of independence, we would like to discuss our interdependence between our cloud data security and our employees. ComputerWeekly recently advised that “teaching employees to be aware of an organisation’s  security requirements can be one of the most effective ways to enhance the company’s overall security programme.” And yet, in a Ponemon survey “only 19 percent of the respondents indicated that their company p... (more)

Hardware-Based Key Managers By @GiladPN | @CloudExpo [#Cloud]

Cloud Key Management vs. Hardware-Based Key Managers Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fully virtualized server to read data about other virtualized systems running on the same physical hardware or the hypervisor). Other threats to cloud security include internal employees and even governments. The consensus is that data encryption is ... (more)

PCI DSS: What You Need to Know By @GiladPN | @CloudExpo

By Lohit Mehta Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infrastructure is exposed can lead to data loss, regulatory penalties, lawsuits, and damaged reputation. Moving on the same lines, to reduce credit card fraud via its exposure, a standard known as Payment Card Industry Data Security Standard (PCI DSS) was formed. History Payment Card Industry Security Standards Council (PCI SSC) had developed a standard known as PCI Data Security Standard (PCI DSS), which comprises... (more)