| | | | | | | SaaS security: Weighing SaaS encryption options | Rich Mogull, Contributor Of all the options for cloud services, Software as a Service (SaaS) provides the least amount of insight and control. With SaaS, organizations are consuming a software application and have to rely, in most cases, almost completely on the security controls and promises of providers. All we know is what they document, what they let us see and what they promise in their contracts. SaaS is a software application shared with others, and even the most secure providers usually need access to our data at some point. They might never take a peek, and might have a hearty array of security and auditing controls around access, but in the end, our data is in a database someplace that someone else needs to manage and keep running. I'm not saying this to generate a bunch of FUD. I provide plenty of private data to the different SaaS providers we use to maintain our business, but that doesn't mean there isn't some risk involved. In our case, that sometimes means keeping certain data in-house. For some of you, this will mean using SaaS, but protecting your data in their environment. Read more Subscribe via RSS
PCI in the cloud: Segmentation, security compliance is possible, experts say Merchants interested in outsourcing their payment processes or looking to reduce internal architecture complexities have been turning to cloud providers, but experts caution that no matter where the credit card data resides, the merchant ultimately is fully responsible for safeguarding the information and maintaining cloud PCI DSS compliance. What the PCI virtualization guidance means for PCI compliance in the cloud
Cloud computing encryption and IaaS security I've started to joke that the growing adoption for cloud computing could be renamed the "Stored Data Encryption Engineer Full Employment Act." Encryption has always been an essential security tool, but for the most part, we haven't used it very often to protect stored data. That's starting to change due to the double whammy of cloud computing, and a heck of a lot of public data exposures. Cloud encryption use cases
| | | | | | Windows Password and Security Tips | | | | | | | | | | | | This e-newsletter is published by SearchCloudSecurity.com, part of the TechTarget network. TechTarget provides IT professionals with the resources they need to perform their jobs: Web sites, newsletters, forums, blogs, white papers, webcasts, events and more. Copyright 2012 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.
This email is published by the TechTarget Security Media Group.
Copyright 2011 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
To unsubscribe from all TechTarget Security Media Group, Go to unsubscribe.
TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466 Contact: webmaster@techtarget.com
When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy. | | | | | |
No comments:
Post a Comment
Keep a civil tongue.