Story image

STUDY: How security managers protect data in public and private clouds

26 Mar 18

Data encryption's use in the cloud is becoming more important to companies in the wake of the increased risk of noncompliance with data privacy laws, a new study has found.

Ponemon Institute’s latest Global Cloud Data Security Study, commissioned by Gemalto, surveyed 3,621 IT and IT security practitioners in the United States, United Kingdom, Australia, Germany, France, Japan, India and Brazil who are familiar and involved in their company’s use of both public and private cloud resources.

It found that more data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.

For security practitioners, this presents a conundrum, as they are often not the decision maker when it comes to the use or the choice of cloud resources.

At the same time, the data that is being stored in the cloud – customer information, emails, consumer data, employee records and payment information – is very the data that is most at risk.

As governments implement tougher privacy and data protection regulations, companies need to be sure that they stay one step ahead with their cloud security measures.

As a result, encryption has become the first and last line of defence for sensitive data stored in the cloud. 

The report also covers

  • Changes needed in cloud governance for GDPR compliance
  • Challenges in cloud security and security compliance
  • How the responsibility for cloud security is slowly shifting to the user
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."