Category: Cloud Computing

(Data at) Rest Assured – CenturyLink and Vormetric Work Together to Secure Data at Rest

Posted By: Steve White, Director, Security and Compliance, CenturyLink Cloud
08 Jul
2015
Categories : Cloud Computing, Cloud Security, Compliance, Data Security            Leave a comment           

As more and more companies move to a cloud model, businesses are giving up physical control of their data repository. If you are the customer and can walk to your server at any point in time, you have a pretty good sense that you are in control of the physical security controls that protect your data. When a company makes the decision to move to the cloud, they are entrusting the cloud provider with the sensitive data that matters most […]

Categories : Cloud Computing, Cloud Security            Leave a comment           

With more than 80 percent – the vast majority of enterprise businesses – now leveraging cloud environments, it’s no surprise that the infiltration of sensitive data into these environments is starting to turning heads. With that said, what can we do today to make both today’s and tomorrow’s use of cloud secure? ClickToTweet: Top 5 Cloud Security Challenges facing the Cloud Adopting Enterprise @cjrad #DefenderOfData http://bit.ly/1aJjths To explore the topic further, this week, the Cloud Security Alliance is hosting its […]

When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of sensitive data within online storage environments, according to the 2015 Vormetric Insider Threat Report: Cloud and Big Data Edition. Enterprises struggle with being able to trust cloud storage users and providers. Users are often unaware of sensitive and unprotected data, which may result in compliance violations or, […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Top 4 Cloud Findings – Cloud and Big Data Insider Threat Report

Posted By: Andy Kicklighter, @akicklighter (Twitter)
26 Mar
2015
Categories : Cloud Computing, Data Security            Leave a comment           

We just this week issued the Cloud and Big Data edition of the 2015 Vormetric Insider Threat Report.  In this edition we concentrated on the results relating directly to cloud and big data environments, and there were some real eye openers once we got a good look at the data. ClickToTweet: 60% of U.S. enterprises store sensitive data in the cloud – and they are worried about it #2015InsiderThreat http://bit.ly/1bzE09h First and foremost, we were very surprised at the rate […]

A GUIDE TO THE CIO’S TOOLBOX

Posted By: Alan Kessler, @kessalan
03 Feb
2015
Categories : Cloud Computing, Cloud Security, Data Breach, Insider Threat, Key Management, Privileged User            Leave a comment           

In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. <ClickToTweet>: IT Security Improvement – A Guide to the CIO’s Toolbox from @kessalan #DefenderOfData http://bit.ly/1yz8Hjy Data-at-rest is susceptible […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

The Twin Drivers to Reprioritize IT Security Spending Now

Posted By: Andy Kicklighter, @akicklighter (Twitter)
13 Nov
2014
Categories : Cloud Computing, Data Encryption, Data Security, Encryption, Privileged User            Leave a comment           

A bit over a week ago some of our senior executives were in New York for a CSO summit. Our own CSO (Sol Cates) and CEO (Alan Kessler) were among those attending. One observation from the summit – this year’s sad (and still growing) total of data breaches is causing people to pause and reflect about how their security dollars are being spent, and how they could be used more effectively. <ClicktoTweet>: Twin Drivers to Reprioritize IT Security Spending @akicklighter […]

Categories : Cloud Computing, Cloud Security, Data Encryption, Data Security            Leave a comment           

From: Jean-Paul Bergeaux, SwishData Federal use of cloud resources has begun to mature, and with this maturity Federal organizations have started to hone-in on the best uses of private and public cloud resources for them. While private clouds have had strong adoption, with the environment more-or-less completely under the control of the agency, it is only recently that the most compelling use cases for agencies to use public cloud environments have started to become clear. The three most compelling use […]

Cloudy with a chance of compromise?

Posted By: Paul Ayers
04 Sep
2014
Categories : Access Control, Cloud Computing, Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

We’ve grown used to hearing about breach incidents on a daily basis, some of which involving the theft of sensitive details and files from cloud environments.  Because cloud computing has transformed the way organisations and individuals approach IT, enabling more agile and cost effective ways of working, the type and volume of data hosted in cloud architectures has increased exponentially making it a target increasingly worthy of unwanted attention from threat actors. From the point of view of protecting this […]