Story image

STUDY: How security managers protect data in public and private clouds

26 Mar 2018

Data encryption's use in the cloud is becoming more important to companies in the wake of the increased risk of noncompliance with data privacy laws, a new study has found.

Ponemon Institute’s latest Global Cloud Data Security Study, commissioned by Gemalto, surveyed 3,621 IT and IT security practitioners in the United States, United Kingdom, Australia, Germany, France, Japan, India and Brazil who are familiar and involved in their company’s use of both public and private cloud resources.

It found that more data is being stored in the cloud, where IT departments have less control over it – and this trend is only set to continue.

For security practitioners, this presents a conundrum, as they are often not the decision maker when it comes to the use or the choice of cloud resources.

At the same time, the data that is being stored in the cloud – customer information, emails, consumer data, employee records and payment information – is very the data that is most at risk.

As governments implement tougher privacy and data protection regulations, companies need to be sure that they stay one step ahead with their cloud security measures.

As a result, encryption has become the first and last line of defence for sensitive data stored in the cloud. 

The report also covers

  • Changes needed in cloud governance for GDPR compliance
  • Challenges in cloud security and security compliance
  • How the responsibility for cloud security is slowly shifting to the user
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
The impact of bringing biometrics to the door
"Despite the benefits of biometrics, there have been impediments to its broader enterprise adoption."