A study entitled, State of Cyber Security 2017, performed by ISACA (Information Systems Audit and Control Association), suggested that cyber security staff are becoming increasingly difficult to find in such a rapidly expanding and evolving field. The report was based on a survey of 633 cyber security specialists across North America and Europe, with 27% stating that they were unable to fill open cyber security positions in their businesses and another 14% unsure as to whether they would ever fill those positions...

Cloud Security: Public Or Private, It’s Getting Better

Cloud Security: Public or Private, It’s Getting Better

It’s the tale as old as time: manifold businesses and organizations hesitate to relocate their most important cloud programs from their private data centers into the more spacious public cloud sphere, out of fear that they’ll jeopardize security and protection in the move. Oftentimes articles will endeavor to rewire these professionals’ thinking about the public cloud, enlighten them to the advantages of making that switch and its potential assets to an enterprise. Yet this article seeks to — gasp! — work with private cloud stalwarts, as well as public cloud champions, on their own terms. For no matter which you feel more comfortable with, security measures have been vastly ameliorated and made more flexible by innovations in one important cloud process: automated functionality.

The majority of security issues in the cloud are understandably generated by some human foible. If cloud systems simply employed a much larger array of automated capacities, such as in regards to the orientation and structure of servers, security would therefore be mightily improved as a consequence. Such a focus on automating the system streamlines operational costs, preempts abnormalities that may encourage a security issue, and heightens enterprises’ practical nimbleness. Obviously not every cloud enterprise will gel seamlessly with every automated server available. However, investing work into locating the ideal match could result in an optimal realignment and maintenance of the operating system, database, and myriad other essential components.

And such meticulous attention to the state of one’s cloud system, with a focus on economizing, can translate into improved data protection. Conducting a full scale assessment of the cloud applications run in an operating system and ensuring that what is on the computers matches what is on the official bookkeeping records can improve a cloud-savvy enterprise at least twofold. Not only would this exercise (greatly facilitated by an asset discovery program or tool) will either prevent or forestall duplication and obsolescence of applications, but it would also provide security personnel with a tighter grasp on the applications and services that require attention to protection measures.

No panacea yet exists to cure every cloud enterprise’s concern with security. Admittedly, keeping track of the latest in protection possibilities in cloud is an almost-full time endeavor. (Read PC World’s dynamic article on the subject here.) However, our rightful fixation on the security conversation continues to inspire companies to take a chance and enter the fray. The more organizations who trust their applications to run in the cloud, the sooner concern over protection will be match with smoother cloud management tools and services.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.


CompTIA Research Study: U.S. Personal Information, Passwords, Medical Data at Risk

By CloudBuzz | September 26, 2017

CompTIA Research Study At Stake: Legislation That Could Affect Whether Hackers or Unscrupulous Repair Shops Gain Access to Private Information without Device Owner’s Knowledge or Consent DOWNERS GROVE, Ill., Sept. 26, 2017 /PRNewswire-USNewswire/ — Millions of Americans increasingly store personal information – such…

Puppet Announces Strategic Partnership with Splunk

By CloudBuzz | September 26, 2017

New app and integration empower customers with automation to enable intelligent analysis, immediate action and continuous enforcement WASHINGTON, DC–(Marketwired – Sep 26, 2017) – In a move to accelerate the transformation of enterprises with DevOps, Puppet, the standard for automating the…

Linux Distributor Red Hat Reports 20.6 Percent Rise In Revenue

By CloudBuzz | September 25, 2017

(Reuters) – Red Hat Inc (RHT.N) reported a 20.6 percent rise in quarterly revenue as the Linux operating system distributor benefited from higher demand for its products targeting hybrid cloud. Net income rose to $96.9 million, or 53 cents per…

Cloudflare Announces Unmetered Mitigation to Make Attacks a Thing of the Past

By CloudBuzz | September 25, 2017

Eliminates “surge pricing” that had been standard in the DDoS mitigation space SAN FRANCISCO, Sept. 25, 2017 (GLOBE NEWSWIRE) — Cloudflare, the leading Internet performance and security company, today announced Unmetered Mitigation, giving customers unlimited and unmetered distributed denial-of-service (DDoS) attack…

IDC – Cognitive and Artificial Intelligence Systems to Reach $57.6 Billion in 2021

By CloudBuzz | September 25, 2017

IDC Spending Guide Forecasts Worldwide Spending on Cognitive and Artificial Intelligence Systems to Reach $57.6 Billion in 2021 FRAMINGHAM, Mass., September 25, 2017 – Worldwide spending on cognitive and artificial intelligence (AI) systems is forecast to reach $57.6 billion in 2021,…

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…