Posted on 04 August 2015 by Garrett Bekker
For security professionals, one of the primary challenges that arises with cloud computing is that they are faced with somehow protecting resources that, to varying degrees, they no longer have control over and for which traditional security controls like firewalls and IPS devices are ineffective. However, regardless of which cloud model you adopt – IaaS, […]
Posted on 30 July 2015 by Thales DIS
This is the second in a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product line from Gemalto. Topics that will be addressed include: how to store data in the AWS cloud with customer-owned encryption, roots of trust, the importance of secure key management, encryption […]
Posted on 30 June 2015 by Thales DIS
This begins a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product line from Gemalto. Topics that will be addressed include: how to store data in the AWS cloud with customer-owned encryption, roots of trust, the importance of secure key management, encryption and pre-boot authentication […]
Posted on 17 June 2015 by Thales DIS
What is the allure of the cloud? Sure, there’s the cost savings and flexibility when trying out new ideas and proofs of concept; not having to commit to acquiring all the necessary infrastructure and the associated CapEx costs. There’s even an entire market segment out there, devoted to helping you maximize cloud spending and efficiency. […]
Posted on 15 May 2015 by Thales DIS
In his podcast recorded by Help Net Security at RSA this year, you’ll learn how the data security changes in the last 5 years have led the infosec industry to where it is today.
Posted on 07 April 2015 by Thales DIS
On April 22nd, I’ll be presenting at the annual RSA Conference in the Expo Briefing Center on “Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control” (session ID CSV-W02). In this session, I’ll cover the cultural changes that organizations should adopt in order to address the complex issues surrounding data access in the […]