Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: compliance

Digital Forensics: E-Discovery Service Types & Legal Terms

June 9, 2021June 11, 2021 by admin

Previous article in series – Digital Forensics: Preparing for a Legal Hold E-Discovery Service Types SaaS-based: To some, “e-discovery in the cloud” means using the cloud to deliver tools used for e-discovery. SaaS packages typically cover one of several e-discovery tasks, such as collection, preservation, or review. Hosted e-discovery (provider): In the cloud, e-discovery can…

Read More

Digital Forensics: Preparing for a Legal Hold

June 8, 2021June 10, 2021 by admin

Previous article in series – Digital Forensics: E-Discovery Preparing for a legal hold or e-discovery may include the following: Consideration of the SLA and contract agreements to ensure that investigations of cloud-based assets are permitted, or to check if prior notification and acceptance are required Contract agreements, explicitly stating the communication path between court participants…

Read More

Digital Forensics: E-Discovery

June 7, 2021June 9, 2021 by admin

Previous article in series – Digital Forensics: Challenges & Recommendations What is E-Discovery? Electronic discovery (e-discovery) is the identification, preservation, collection, processing, review, analysis, or production of electronically stored information. Often it is the support mechanism and the impetus for investigations, data acquisition, and insight-driven initiatives. To properly manage e-discovery a multidisciplinary team needs to…

Read More

Digital Forensics: Challenges & Recommendations

June 6, 2021June 9, 2021 by admin

Welcome to the fun world of Digital Forensics! *ahem* It’s even more fun on the Cloud. Gathering evidence is a crucial part of digital forensics, cloud or otherwise. Therefore, it is important to identify challenges before you begin the process. Key challenges to keep in mind are – The seizure of servers containing files from…

Read More

Corporate & Cloud Governance

June 5, 2021June 9, 2021 by admin

Policies are the foundation of corporate governance. They require penalties as well as senior management sponsorship to be effective. Policies are created in response to a requirement such as a standard or requirement benchmark. This standard is the result of either a regulation, which is a legislative requirement, or a contractual requirement such as a…

Read More

Governance, Risk Management, and Compliance (GRC)

May 26, 2021May 24, 2021 by admin

An approach commonly known as governance, risk management, and compliance (GRC) has evolved to analyze risks and manage mitigation in alignment with business and compliance objectives. Governance ensures the business focuses on core activities, clarifies who in the organization has the authority to make decisions, determines accountability for actions and responsibility for outcomes, and addresses…

Read More

Intrusion Kill Chain Framework by Lockheed Martin

May 10, 2021May 15, 2021 by admin

The “intrusion kill chain” framework is an analytical tool introduced by Lockheed Martin security researchers in 2011. It is also sometimes referred to as the “Cyber Kill Chain”. It is an intelligence- driven, threat-focused approach to study intrusions from the adversaries’ perspective that could give network defenders the upper hand in fighting cyber attackers. So, what is…

Read More

Revisiting the Target breach of 2013

May 10, 2021May 15, 2021 by admin

Between November 27 and December 18, 2013, the Target Corporation’s network was breached. 40 million credit and debit card numbers and 70 million records of personal information were stolen. The ordeal cost credit card unions over two hundred million dollars for just reissuing cards. Six months prior to the breach, Target deployed a well-known and…

Read More

Cloud Encryption Challenges

February 22, 2021July 12, 2021 by admin

There are myriad factors influencing encryption considerations and associated implementations in the enterprise. The usage of encryption should always be directly related to business considerations, regulatory requirements, and any additional constraints that the organization may have to address. Different techniques will be used based on the location of data, whether at rest, in transit, or…

Read More

Cloud Data Storage: Key Threats

February 19, 2021May 11, 2021 by admin

Are you using cloud storage services? If yes, then you need to be aware of these key threats. In the cloud, data storage can be manipulated into unauthorized usage, for example, by account hijacking or uploading illegal content. The multitenancy of cloud storage makes tracking unauthorized usage more challenging. Unauthorized access: Unauthorized access can happen due to…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!