Data Security in Cloud Computing: 8 Key Concepts

ANDY PATRIZIO | March 27, 2019

article image
Migrating to a cloud computing platform means your responsibility for data security goes up considerably. Data with various levels of sensitivity is moving out of the confines of your firewall. You no longer have control – your data could reside anywhere in the world, depending on which cloud company you use.Moving to the public cloud or using a hybrid cloud means the potential for cloud security issues is everywhere along the chain. It can happen as the data is prepped for migration, during migration, or potentially within the cloud after the data arrives. And you need to be prepared to address this every step of the way.Data security has been incumbent on the cloud service providers, and they have risen to the occasion. No matter which platform you select in the debate between AWS vs. Azure vs. Google, all sport various compliances to standards like HIPAA, ISO, PCI DSS, and SOC.However, just because the providers offer compliance doesn’t give customers the right to abdicate their responsibilities. They have some measure of responsibility as well, which creates a significant cloud computing challenge. So here are eight critical concepts for data security in the cloud.

Spotlight

Reliant Solutions

Reliant is the leading provider of edge computing solutions for the retail and hospitality industries. The Reliant Platform is a better way to deploy and manage applications, networks, and security controls at the store or restaurant. By utilizing edge computing, your technology will be transformed and the way applications and infrastructure are delivered will reduce costs, improve security, and increase reliability.

OTHER ARTICLES

Researchers Explore Details of Critical VMware Vulnerability

Article | April 17, 2020

Researchers have published the details of an investigation into CVE-2020-3952, a major vulnerability in VMware's vCenter that was disclosed and patched on April 9. The flaw was given a CVSS score of 10. CVE-2020-3952 exists in VMware's Directory Service (vmdir), which is a part of VMware vCenter Server, a centralized management platform for virtualized hosts and virtual machines. Through vCenter Server, the company says, an administrator can manage hundreds of workloads. The platform uses single sign-on (SSO), which includes vmdir, Security Token Service, an administration server, and the vCenter Lookup Service. Vmdir is also used for certificate management for the workloads vCenter handles.

Read More

VMware Tanzu Service Mesh, built on VMware NSX is Now Available

Article | March 11, 2020

VMware marked its entry into the service mesh space with the announcement of VMware NSX Service Mesh. Today, we have some exciting developments to share. First, VMware NSX Service Mesh is now VMware Tanzu Service Mesh. This new brand aligns with the VMware Tanzu Portfolio for modern applications that we launched today. Second, and more importantly, we are announcing that Tanzu Service Mesh, built on VMware NSX is now available for purchase. Tanzu Service Mesh provides consistent connectivity and security for microservices – across all your Kubernetes clusters and clouds – in the most demanding multi-cluster and multi-cloud environments. Tanzu Service Mesh can be installed in Tanzu Kubernetes Grid (TKG) clusters and third-party Kubernetes-conformant clusters, and used with clusters managed by Tanzu Mission Control (i.e., Tanzu-managed clusters) or clusters managed by other Kubernetes platforms and managed services.

Read More

Security concerns hampering adoption of containers and Kubernetes

Article | February 19, 2020

Enterprises are having significant problems with security when it comes to Kubernetes and container deployments, according to a new survey from security company StackRox. In the winter 2020 edition of its State of Container and Kubernetes Security Report, StackRox researchers found that 94% of respondents experienced a security incident in their Kubernetes and container environments during the last 12 months. This very high number of security incidents led to about 44% of organizations delaying or outright halting application deployment into production.Researchers spoke with more than 540 IT professionals, the majority of whom work for tech companies or organizations involved in financial services.

Read More

Essential things to know about container networking

Article | March 8, 2020

Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says Michael Letourneau, an IT architect at Liberty Mutual Insurance. "Putting an application into a container automatically drives the need for network connectivity for that container," says Letourneau, whose primary focus is on building and operating Liberty Mutual's container platform.

Read More

Spotlight

Reliant Solutions

Reliant is the leading provider of edge computing solutions for the retail and hospitality industries. The Reliant Platform is a better way to deploy and manage applications, networks, and security controls at the store or restaurant. By utilizing edge computing, your technology will be transformed and the way applications and infrastructure are delivered will reduce costs, improve security, and increase reliability.

Events