Category: Cloud Computing

Categories : Cloud Computing, Cloud Security            Leave a comment           

With more than 80 percent – the vast majority of enterprise businesses – now leveraging cloud environments, it’s no surprise that the infiltration of sensitive data into these environments is starting to turning heads. With that said, what can we do today to make both today’s and tomorrow’s use of cloud secure? ClickToTweet: Top 5 Cloud Security Challenges facing the Cloud Adopting Enterprise @cjrad #DefenderOfData http://bit.ly/1aJjths To explore the topic further, this week, the Cloud Security Alliance is hosting its […]

When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of sensitive data within online storage environments, according to the 2015 Vormetric Insider Threat Report: Cloud and Big Data Edition. Enterprises struggle with being able to trust cloud storage users and providers. Users are often unaware of sensitive and unprotected data, which may result in compliance violations or, […]

01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Categories : Cloud Computing, Data Security            1Comments           

We just this week issued the Cloud and Big Data edition of the 2015 Vormetric Insider Threat Report.  In this edition we concentrated on the results relating directly to cloud and big data environments, and there were some real eye openers once we got a good look at the data. ClickToTweet: 60% of U.S. enterprises store sensitive data in the cloud – and they are worried about it #2015InsiderThreat http://bit.ly/1bzE09h First and foremost, we were very surprised at the rate […]

A GUIDE TO THE CIO’S TOOLBOX

Posted By: Alan Kessler
03 Feb
2015
Categories : Cloud Computing, Cloud Security, Data Breach, Insider Threat, Key Management, Privileged User            Leave a comment           

In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. <ClickToTweet>: IT Security Improvement – A Guide to the CIO’s Toolbox from @kessalan #DefenderOfData http://bit.ly/1yz8Hjy Data-at-rest is susceptible […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

13 Nov
2014
Categories : Cloud Computing, Data Encryption, Data Security, Encryption, Privileged User            Leave a comment           

A bit over a week ago some of our senior executives were in New York for a CSO summit. Our own CSO (Sol Cates) and CEO (Alan Kessler) were among those attending. One observation from the summit – this year’s sad (and still growing) total of data breaches is causing people to pause and reflect about how their security dollars are being spent, and how they could be used more effectively. <ClicktoTweet>: Twin Drivers to Reprioritize IT Security Spending @akicklighter […]

Categories : Cloud Computing, Cloud Security, Data Encryption, Data Security            Leave a comment           

From: Jean-Paul Bergeaux, SwishData Federal use of cloud resources has begun to mature, and with this maturity Federal organizations have started to hone-in on the best uses of private and public cloud resources for them. While private clouds have had strong adoption, with the environment more-or-less completely under the control of the agency, it is only recently that the most compelling use cases for agencies to use public cloud environments have started to become clear. The three most compelling use […]

Cloudy with a chance of compromise?

Posted By: Paul Ayers
04 Sep
2014
Categories : access control, Cloud Computing, Cloud Security, Data Breach, Data Encryption, Data Security            Leave a comment           

We’ve grown used to hearing about breach incidents on a daily basis, some of which involving the theft of sensitive details and files from cloud environments.  Because cloud computing has transformed the way organisations and individuals approach IT, enabling more agile and cost effective ways of working, the type and volume of data hosted in cloud architectures has increased exponentially making it a target increasingly worthy of unwanted attention from threat actors. From the point of view of protecting this […]

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]