CASB: What to look for in a cloud access security broker - featured

What to Look for in a CASB (Cloud Access Security Broker)

Best Practices, CASB

As your organization transitions more and more of its applications into the cloud, cloud security will become an ever more urgent challenge to solve. Reliably and consistently protecting enterprise and customer data in a highly distributed, multi-vendor environment is no easy task, especially without a centralized point of contact from which administrators can apply policies, controls, and protections to several …

Tokenization 101 - best practices for cloud

Cloud Best Practices: Tokenization 101

Best Practices, Cloud

  Encryption is inarguably critical to cloud data protection for the enterprise, as every IT decision-maker knows. But encryption cannot be the only tool in an organization’s cloud data protection toolbox. There are cases where encryption is not the solution, and for many of those cases, tokenization is the answer. Here are the facts to know about tokenization and its …

Let’s Discuss Zero-Knowledge Data

Best Practices

This is the second article in a series: you can read the first article on data security here.   In cryptography, zero-knowledge proof is a method by which one party can prove to another party that a statement is true, without revealing information about the statement. Goldwasser, Micali, and Reckoff from MIT first proposed the concept in their 1980’s paper. …


3 Reasons Why Detecting Cloud Malware Is Essential for Cloud Security Solutions

Best Practices, Cloud Security

Key Considerations for Cloud Security Solutions Among all the talk of measures organizations can take to improve their cloud data security, cloud malware detection can get overlooked. It’s often assumed that the malware problem has already been addressed, usually through client-side firewalls and endpoint security software. As with many other facets of cloud security solutions, however, an additional layer of …

Bob West on Balancing Security Needs and Business Goals

Best Practices, Bob West 0 Comments

When it comes to protecting sensitive or regulated data and mitigating the risks of a data breach, having the right technology and implementing it in the right way are vital pieces of the puzzle—but by no means the only pieces of the puzzle. Businesses must find ways to balance their security needs with their business goals before they can determine …

Cloud data security threat #1: Malicious insiders The simple fact of the matter is that the more people who have access to your data in the clear, the greater the risk of data theft or a data breach. You may have vetted everyone in your own organization carefully and monitor their activities extensively, but can you say the same of your cloud service providers (CSPs)? Whether tempted by personal gain or motivated by simple malice, potential rogue administrators or DBAs at your CSPs pose a serious threat to your cloud data security and regulatory compliance. Cloud data security threat #2: Hackers and eavesdroppers Malicious insiders are one thing, but enterprises that adopt cloud computing must also worry about their data and user sessions being stolen or intercepted by outsiders, such as hackers and government agencies. Data that's in the clear, either in storage or during a session, is data that's ripe for plunder. The NSA may do nothing more nefarious with your data than put it in a database for analysis, but hackers, like malicious insiders, are typically motivated by either personal gain—identity theft can bring in big money, after all—or the simple desire to cause trouble. Either way, your data is at risk, and so are your compliance status, your customers' trust, and your bottom line. Cloud data security threat #3: Cloud API vulnerabilities People wouldn't pose a threat to cloud data security if the cloud itself didn't present vulnerabilities. Among the most serious vulnerabilities are those that can be found in the software interfaces—APIs—that cloud applications use. CSPs expose their APIs so customers can manage, integrate, and interact with the cloud services, and the security of these APIs is absolutely critical. APIs handle everything "from authentication and access control to encryption and activity monitoring," according to the Cloud Security Alliance, and a weakness in the API can lead to a breach. Additionally, the open nature of APIs means that as organizations build on them to create purpose-built solutions, the probability of a vulnerability increases.

3 Threats to Cloud Data, and How to Address Them

Best Practices, Cloud 0 Comments

When it comes to cloud data security, fear, uncertainty, and doubt abound. In particular, enterprises in fields with heavy regulatory burdens around data privacy—healthcare, for instance, or financial services—may see the cloud as simply too risky to adopt. But a closer examination of some of the top threats to cloud data security show that the solution can be simpler than …


Financial Services: It’s Time to Adopt the Cloud

Banking/Financial Services, Best Practices, Cloud 0 Comments

Resistance to cloud computing in financial services is finally crumbling now that solutions exist to address the security and compliance challenges that have created cloud FUD in the past. That’s a very good thing for financial services organizations. The latest Ovum research shows that the financial services industry is increasingly investing in cloud computing, encouraged both by a growing variety …


3 Cloud Data Security Issues That Can Impact PCI DSS Compliance

Best Practices, Cloud Security, Compliance 0 Comments

For many organizations considering a move to the cloud for business-critical operations, PCI DSS compliance is a major concern. Cloud computing offers a number of competitive advantages that simply can’t be denied. But businesses must make sure their cloud data protection strategies ensure compliance. Luckily, a simple solution exists to solve many common cloud data security issues that impact PCI …


3 Ways Encryption in the Cloud Can Prepare You for Risk Assessments

Best Practices, Compliance 0 Comments

For organizations with heavy data security or compliance requirements, regular risk assessments are a must, and even more so if you keep any sensitive data in the cloud. You must know what assets you have, their relative vulnerability, their relative value (not only to your organization, but to attackers and competitors), and the probability of their loss. Only then can …


Cloud Information Protection & Compliance: Four Best Practices for a Powerful Combination

Best Practices, Bob West, Cloud Security, Compliance 0 Comments

For businesses operating under strict regulatory compliance requirements, having a well-planned cloud information protection strategy is critical to successful cloud adoption. PCI DSS, GLBA, SOX, HIPAA, and HITECH all have something to say about the storage, use, and sharing of sensitive personal information. We spoke with CipherCloud Chief Trust Officer Bob West about the steps every organization should take to …