Story image

STUDY: How security managers protect data in public and private clouds

26 Mar 18

Data encryption's use in the cloud is becoming more important to companies in the wake of the increased risk of noncompliance with data privacy laws, a new study has found.

Ponemon Institute’s latest Global Cloud Data Security Study, commissioned by Gemalto, surveyed 3,621 IT and IT security practitioners in the United States, United Kingdom, Australia, Germany, France, Japan, India and Brazil who are familiar and involved in their company’s use of both public and private cloud resources.

It found that more data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.

For security practitioners, this presents a conundrum, as they are often not the decision maker when it comes to the use or the choice of cloud resources.

At the same time, the data that is being stored in the cloud – customer information, emails, consumer data, employee records and payment information – is very the data that is most at risk.

As governments implement tougher privacy and data protection regulations, companies need to be sure that they stay one step ahead with their cloud security measures.

As a result, encryption has become the first and last line of defence for sensitive data stored in the cloud. 

The report also covers

  • Changes needed in cloud governance for GDPR compliance
  • Challenges in cloud security and security compliance
  • How the responsibility for cloud security is slowly shifting to the user
How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.