Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Month: July 2021

Key Management Options

July 16, 2021July 13, 2021 by admin

XML Key Management Specification (XKMS) XML (Extensible Markup Language), the flexible data framework that allows applications to communicate on the internet, has become the preferred infrastructure for e-commerce applications. XML-based standards and specifications have been in development for use in the field of key management systems. One such specification is the XML Key Management Specification…

Read More

Encryption Key Management

July 15, 2021July 13, 2021 by admin

In the old traditional banking environments, a safe required two people with keys to open it; this led to a reduced number of thefts, crimes, and bank robberies. Encryption, as with bank processes, should never be handled or addressed by a single person. Encryption and segregation of duties should always go hand in hand. Key…

Read More

Data Rights Management (DRM)

July 14, 2021 by admin

Data rights management (DRM) is a technology aimed at controlling the use of digital content. DRM technology was originally invented by publishers to control media such as audio and video rights. To design and implement data rights management within an organization, traditional security approaches such as access control and data classification have been used to…

Read More

Cloud Data Encryption Architecture and Options

July 14, 2021July 12, 2021 by admin

Encryption architecture is very much dependent on the goals of the encryption solutions, along with the cloud delivery mechanism. Protecting data at rest from local compromise or unauthorized access differs significantly from protecting data in motion into the cloud. Adding additional controls to protect the integrity and availability of data can further complicate the process….

Read More

Is your Sensitive Data hiding from you?

July 14, 2021 by admin

The modern enterprise has evolved into a giant producer and consumer of data. Despite the large volume of controls and efforts to protect various data types, very few organizations can map exactly where their sensitive data is located and what security controls are deployed to guard it. Structured data types that are centrally managed allow…

Read More

When is one Cloud a better fit than others?

July 13, 2021 by admin

All major Cloud Service Providers follow the same best practices when building, managing, and delivering cloud services. So, how does one choose the right provider if they are almost identical? It all comes down to the workload you plan to move or create in the cloud. Let’s take an example – you are tasked with…

Read More

QuickGuide: Encryption

July 13, 2021July 12, 2021 by admin

Symmetric Encryption There are two primary forms of cryptography in use today: symmetric and asymmetric cryptographies. Symmetric algorithms operate with a single cryptographic key that is used for both encryption and decryption of the message. For this reason, it is often called single, same, or shared key encryption. It can also be called secret or…

Read More

Data Loss Prevention (DLP)

July 12, 2021 by admin

Data loss prevention and data leakage prevention are terms used interchangeably to describe the controls put in place by an organization to ensure that certain types of data (structured and unstructured) remain under organizational controls, in line with policies, standards, and procedures. Controls to protect data form the foundation of organizational security and enable the…

Read More

Data Anonymization

July 11, 2021July 12, 2021 by admin

Direct identifiers and indirect identifiers form two primary components for identification of individuals, users, or personal information. Direct identifiers are fields that uniquely identify the subject (usually name, address, etc.) and are usually referred to as personally identifiable information. Masking solutions are usually used to protect direct identifiers. Indirect identifiers typically consist of demographic or…

Read More

Data Masking/Obfuscation

July 10, 2021July 12, 2021 by admin

Data masking or data obfuscation is the process of hiding, replacing, or omitting sensitive information from a specific data set. Data masking is usually used to protect specific data sets such as PII or commercially sensitive data or to comply with certain regulations such as HIPAA or PCI DSS. Data masking or obfuscation is also…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!