This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Here is the next one.
Sometimes great old blog posts are hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts over the past quarter. This covers both Anton on Security and my posts from Google Cloudblog , and now our Cloud Security Podcast too! Here is the next one.
Great old blog posts are sometimes hard to find (especially on Medium) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). “A Here is the next one.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Use Cloud Securely? “How
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloudblog [and now our Cloud Security Podcast too!] Here is my second.
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and now our Cloud Security Podcast too! CloudMigration Security Woes”. “Is
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and now our Cloud Security Podcast too! Here is my third.
Great old blog posts are sometimes hard to find (especially on Medium) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Understand the Nature of Data in CloudMigration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloudmigration.
From Google CloudBlog: “Improving security, compliance, and governance with cloud-based DLP data discovery” So, I’ve been doing some blogging at Google Cloudblog with most posts connected to products, launches, etc. However, I am also doing a fun blog series on DLP in the cloud.
Understand the Nature of Data in CloudMigration As noted, to meet data sovereignty requirements, organizations will often have to set up cloud data centers in multiple jurisdictions and, as such, carry out cloudmigration.
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloudblog [and now our Cloud Security Podcast too!]. CloudMigration Security Woes”. “Is
From Google CloudBlog: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” Here is another very fun resource we created (jointly with Andrew Lance from Sidechain ), a paper on designing and running data security strategy on Google Cloud. Read our launch blog here ?—?a What to do?
With details from our report, I also highlighted how demand for modernization, mobile payments, IoT, cloudmigration and cost savings is driving the push for new technologies while increasing opportunities for threats. They have to enforce these controls that are defined by them by encrypting the data.”.
Two-thirds of the global population will be protected by privacy regulations by 2023, and 70% of organizations say such regulations make cloudmigrations and analytics more difficult. The solution is data encryption, which uses mathematical algorithms to scramble data, replacing plaintext with ciphertext.
Thales eSecurity’s Data Threat Report found that the top motivations for IT security spending included cloudmigration at (39%) which tied with the desire to avoid data breach penalties (39%) and was closely followed by compliance (37%). Encryption has now become the leading solution for protecting sensitive data.
Sometimes great old blog posts are hard to find (especially on Medium ) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”.
Sometimes great old blog posts are hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts over the past quarter. This covers both Anton on Security and my posts from Google Cloudblog , and now our Cloud Security Podcast too! CloudMigration Security Woes”. “Is
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Digital transformation is driving IT modernization, IoT, and cloudmigrations at a record pace in the federal government. IT modernization and cloudmigrations of legacy systems are already putting our infrastructures and application stacks in a much stronger security posture. are discovered. Federal Agencies.”
In a move that could bring some relief to organizations looking to secure their cloudmigrations, Amazon Web Services on Friday announced that it had acquired Wickr, provider of secure end-to-end encryption and communications platform. government agencies, it could help strengthen AWS’ position in the public sector.”.
This requires a more evolved security policy and approach that doesn’t call for native key management as a services offer from cloud providers. I would not recommend entrusting your data in the cloud without maintaining control of the encryption keys that protect that data.
Widespread use of VM clusters processing sensitive information requires data at rest and workload security across on-premises, multi-cloud, and hybrid deployments to keep evildoers in check. Businesses have also shifted capital to operational expense models through cloudmigration, which has also delivered more flexibility.
Bring Your Own Key to the Cloud. For enterprises that elect to use encryption to protect their data, securing their encryption keys is their responsibility and it is of paramount importance. Bring Your Own Key (BYOK) allows enterprises to encrypt their data and retain control and management of their encryption keys.
There is no longer denying that encryption is a hot topic. Encryption is everywhere. We hear about it when the FBI can’t hack an iPhone, when countries want back doors to compromise it, and, now, every major cloud provider offers at least baseline encryption as part of their service. Thales giveth keys.
How better key management can close cloud security gaps troubling US government madhav Thu, 02/29/2024 - 05:38 In my first blog on this topic I noted a Treasury Department report released last year listed six cloud security challenges financial sector firms face. This hack included US Government networks.
In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. The most sensitive data, particularly the vehicle’s secret data and the user’s private data, should be encrypted using a robust algorithm.
Gartner predicts that the worldwide public cloud services market will grow 17 percent in 2018 to $287.8 While the increase in cloudmigration is by no means a new trend, we are seeing more and more organizations seeking cloud-like consolidation, whether on-premises or in a private or public cloud. billion in 2017.
How better key management can close cloud security gaps troubling US government madhav Thu, 02/29/2024 - 05:38 In my first blog on this topic I noted a Treasury Department report released last year listed six cloud security challenges financial sector firms face. This hack included US Government networks.
For example, cyber criminals can leverage machine identities to evade detection by hiding in encrypted traffic. Remote work and cloudmigration have created new norms and business models. They provide threat actors multiple ways of infiltrating networks. Guest Blogger: Anastasios Arampatzis. Machine Identity Management.
This is further augmented with an accelerated cloudmigration, primarily towards multi-cloud deployments. With a larger number of SaaS Apps across multiple cloud platforms to secure, operational errors and their associated risks start to grow. Of course, no good story is complete without some dark characters.
Just as you wouldn't feel comfortable if a shop left your credit card information on a sticky note, PCI DSS ensures that businesses treat your payment data with extra care, keeping it encrypted, well-protected, and out of reach from anyone who shouldn't have access to it. PCI compliance made easy. Thales Top PCI DSS 4.0 Thales Top PCI DSS 4.0
Securing the Journey to AI with Thales Sovereign Solutions for AWS josh.pearson@t… Mon, 06/24/2024 - 22:28 Encryption David Ortega | Principle Solution Architect More About This Author > Amazon Web Services (AWS) is the world's largest cloud service provider. What Are GenAI Security Challenges?
Securing the Journey to AI with Thales Sovereign Solutions for AWS josh.pearson@t… Mon, 06/24/2024 - 22:28 Encryption David Ortega | Principle Solution Architect More About This Author > Amazon Web Services (AWS) is the world's largest cloud service provider. What Are GenAI Security Challenges?
As we mentioned many times, t he source data types for detection in the cloud are changing or at least their importance is being rebalanced. In the long run, network focused detection controls that rely on packet capture and traffic metadata will likely decrease in importance due to growth of encryption and bandwidth.
As we mentioned many times, t he source data types for detection in the cloud are changing or at least their importance is being rebalanced. In the long run, network focused detection controls that rely on packet capture and traffic metadata will likely decrease in importance due to growth of encryption and bandwidth.
Crucially, this award recognizes the teamwork carried out over several years by Microsoft and Thales to help organizations secure their identities when migrating to the cloud. Multi-Factor Authentication: the mandatory first step for organizations moving to the cloud.
While the cloud has matured greatly and public cloud vendors have drastically improved security measures , technologies, services, and the overall security infrastructure, cloud security is certainly still one of the major concerns with cloud infrastructure of all types.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
And when strong passwords and MFA let you down, encryption can keep sensitive data from being accessed by cybercriminals. Strong passwords can repel a brute force attack, but MFA is the extra layer of protection when a reused password is used in a credential stuffing attack. LW: How important is effective cybersecurity awareness training?
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Here is the next one.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content