Welcome!

Apache Authors: Elizabeth White, Pat Romanski, Liz McMillan, Christopher Harrold, Janakiram MSV

Related Topics: @CloudExpo, Release Management , Ruby-On-Rails, Apache, Cloud Security

@CloudExpo: Blog Post

Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]

Digital data theft is more prevalent than physical theft

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies.

Security in the Cloud: Unique Challenges
In the cloud, data security poses new risks and challenges. We are no longer concerned just with burglars breaking into our offices to steal computers, but rather with the data belonging to complete systems deployed to the cloud.

Security in the cloud cloud security issues Cloud Security Cloud Encryption cloud computing security issues and challenges  cloud computing security issues and challenges Cloud Computing Security Issues and Challenges:  Digital data theft is more prevalent than physical theft

When using public cloud infrastructure like that of AWS, VMware, Microsoft Azure, or HP Helion, we also have little fear of "bad guys" breaking into their datacenters. These large providers take access controls and infrastructure security very seriously.

Instead, security in the cloud becomes not about protecting our hardware, but rather protecting the sensitive information regardless of its physical location. For this, burglar alarms are irrelevant and firewalls are only one part of the approach for security in the cloud.

A way to visualize the unique challenges of data security in the cloud is that where before we had brick walls and steel locks to keep us safe; we now must construct mathematical walls as barriers to our data.

An important aspect in cloud security is cloud encryption. By properly encrypting the data we store in the cloud, we ensure that even if our security perimeter is breached, our data is rendered unreadable, unusable, and unsellable.

But, as it turns out, cloud encryption in and of itself is also not enough. Companies have encrypted well, using best-in-class algorithms to protect their business data, and still been compromised. The important piece is the encryption key. When businesses store the key to decrypt their data in the cloud, alongside the encrypted data itself, they make it easy for a hacker to use the same access point used to get the data to then get the key to decrypt it. In other examples, companies have entrusted their encryption keys to their cloud provider: the cloud provider essentially owns the sensitive data in this situation. The best practice must be different.

Security in the Cloud: Unique Solutions
The cloud has posed interesting obstacles to data security. And, as it turns out, the cloud has also brought forth even more interesting solutions.

In our new software-defined existence, the solution to cloud challenges resides in software built for the cloud.

For example, a pair of new technologies known as split key encryption and homomorphic key management have reinvented the way cloud encryption keys are handled; thus solving the issue of cloud key management.

By splitting encryption keys into two (or more) parts, this software-defined approach mimics the successful security of Swiss banks, where the account owner holds one key, the banker holds one key, and both keys are required to access the contents. Split key encryption is the first of two important cloud advancements toward total security in the cloud.

The next advancement is homomorphic key management, which is also a software-defined, cloud approach. With it, the encryption keys themselves are encrypted. This way, even while the key is being used in the cloud, it is never in unencrypted form, never to be seen "bare" by hackers, and renders the data it protects totally inaccessible to anyone but the data owner.

Security in the Cloud to Protect Privacy and Achieve Compliance
It is not just businesses themselves that have been concerned with data security in the cloud. Regulatory bodies in many industries view cloud security has a major concern and have amended their regulations to match. The approaches of split key encryption and homomorphic key management help businesses protect the privacy of their customers while also enable them to achieve compliance with HIPAA, PCI, and other regulations.

The post Cloud Computing Security Issues and Challenges: Digital data theft is more prevalent than physical theft appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

IoT & Smart Cities Stories
Over the course of two days, in addition to insightful conversations and presentations delving into the industry's current pressing challenges, there was considerable buzz about digital transformation and how it is enabling global enterprises to accelerate business growth. Blockchain has been a term that people hear but don't quite understand. The most common myths about blockchain include the assumption that it is private, or that there is only one blockchain, and the idea that blockchain is...
Where many organizations get into trouble, however, is that they try to have a broad and deep knowledge in each of these areas. This is a huge blow to an organization's productivity. By automating or outsourcing some of these pieces, such as databases, infrastructure, and networks, your team can instead focus on development, testing, and deployment. Further, organizations that focus their attention on these areas can eventually move to a test-driven development structure that condenses several l...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...