sb-as logo
Story image

STUDY: How security managers protect data in public and private clouds

26 Mar 2018

Data encryption's use in the cloud is becoming more important to companies in the wake of the increased risk of noncompliance with data privacy laws, a new study has found.

Ponemon Institute’s latest Global Cloud Data Security Study, commissioned by Gemalto, surveyed 3,621 IT and IT security practitioners in the United States, United Kingdom, Australia, Germany, France, Japan, India and Brazil who are familiar and involved in their company’s use of both public and private cloud resources.

It found that more data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.

For security practitioners, this presents a conundrum, as they are often not the decision maker when it comes to the use or the choice of cloud resources.

At the same time, the data that is being stored in the cloud – customer information, emails, consumer data, employee records and payment information – is very the data that is most at risk.

As governments implement tougher privacy and data protection regulations, companies need to be sure that they stay one step ahead with their cloud security measures.

As a result, encryption has become the first and last line of defence for sensitive data stored in the cloud. 

The report also covers

  • Changes needed in cloud governance for GDPR compliance
  • Challenges in cloud security and security compliance
  • How the responsibility for cloud security is slowly shifting to the user
Story image
Five Eyes nations want legal access to backdoors to fight 'illegal content'
The nations argue that encryption can make the enforcement of public safety difficult, particularly when it comes to serious problems like child exploitation. More
Story image
Nokia: Cyber attacks on internet-connected devices on the rise
Cyberattacks on internet-connected devices continue to rise at an alarming rate due to poor security protections.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More
Story image
Businesses left to make decisions based on old, inaccurate data, study finds
"It is more critical than ever that organisations have access to actionable, contextualised, near real-time threat data to power the network and application security tools they use to detect and block malicious actors."More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More