Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: cloud

Challenges with Data Discovery in the Cloud

July 22, 2021July 14, 2021 by admin

As a cloud security professional, you need to be prepared to generate solutions to overcome these obstacles: Identifying where your data is: The idea of data in the cloud is at once both liberating and terrifying. The ability to have data available “on real-time demand,” across almost any platform and access mechanism, is an incredible…

Read More

Data Discovery

July 21, 2021July 14, 2021 by admin

One of the most important new trends in business intelligence is data discovery. It is a departure from traditional business intelligence in that it emphasizes interactive, visual analytics rather than static reporting. The goal of data discovery is to work with and enable people to use their intuition to find meaningful and important information in…

Read More

Data Deletion and Media Sanitization

July 20, 2021July 14, 2021 by admin

Data represents a very important enterprise asset. That makes the use of cloud-based services a significant risk. To mitigate that risk, organizations must consider options for removing their data from the cloud should the requirement arise. These environments host multiple types, structures, and components of data among various resources. For components within a multitenant environment,…

Read More

Key Management: Common Approaches on the Cloud

July 17, 2021July 13, 2021 by admin

For cloud-computing key management services, the following two approaches are most utilized: Remote key management service: This is where the customer maintains the key management service (KMS) on premises. Ideally, the customer will own, operate, and maintain the KMS, resulting in the customer controlling the information confidentiality, while the cloud provider can focus on the…

Read More

Data Rights Management (DRM)

July 14, 2021 by admin

Data rights management (DRM) is a technology aimed at controlling the use of digital content. DRM technology was originally invented by publishers to control media such as audio and video rights. To design and implement data rights management within an organization, traditional security approaches such as access control and data classification have been used to…

Read More

Cloud Data Encryption Architecture and Options

July 14, 2021July 12, 2021 by admin

Encryption architecture is very much dependent on the goals of the encryption solutions, along with the cloud delivery mechanism. Protecting data at rest from local compromise or unauthorized access differs significantly from protecting data in motion into the cloud. Adding additional controls to protect the integrity and availability of data can further complicate the process….

Read More

Is your Sensitive Data hiding from you?

July 14, 2021 by admin

The modern enterprise has evolved into a giant producer and consumer of data. Despite the large volume of controls and efforts to protect various data types, very few organizations can map exactly where their sensitive data is located and what security controls are deployed to guard it. Structured data types that are centrally managed allow…

Read More

When is one Cloud a better fit than others?

July 13, 2021 by admin

All major Cloud Service Providers follow the same best practices when building, managing, and delivering cloud services. So, how does one choose the right provider if they are almost identical? It all comes down to the workload you plan to move or create in the cloud. Let’s take an example – you are tasked with…

Read More

Cloud Storage Services

July 9, 2021July 12, 2021 by admin

At the core of all cloud services, products, and solutions are software tools with three underlying pillars of functionality: Processing data and running applications (compute servers) Moving data (networking) Preserving or storing data (storage) Cloud Storage Services Cloud storage is basically defined as data storage that is made available as a service via a network….

Read More

Data Security : The Secure Data Lifecycle

July 5, 2021July 7, 2021 by admin

Data security is a core element of cloud security. Cloud service providers often share the responsibility for security with the customer. Roles such as the chief information security officer (CISO), chief security officer (CSO), chief technology officer (CTO), enterprise architect, and network administrator may all play a part in providing elements of a security solution…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 10
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!