Larry_Warnock

5 Cloud Security Predictions For 2014

5 Cloud Security Predictions For 2014

Data security is always a hot topic among IT industry pundits, but I believe 2013 will go down as the year security crawled out of the basement and into the cultural zeitgeist.gazzang_image

Edward Snowden and the NSA spying revelations may have been the biggest tech story of the year. And mass data breaches at Twitter, Facebook, Adobe and The New York Times (just to name a few) were PR nightmares that raised the profile of data security — particularly in the cloud — as a recurring topic of conversation in the boardroom.

No doubt today’s breaking news will define many of tomorrow’s innovative technologies. We’re watching these developments closely at Gazzang and continuing to evolve and enhance our solutions to meet the growing needs of enterprises in the cloud and with big data.

As we close the book on 2013, I’d like to share a few cloud security-related predictions for 2014:

  •  SaaS vendors will offer encryption keys revocable by end users. SaaS providers understand they have an obligation to protect sensitive data on behalf of their clients. I believe more cloud vendors will provide encryption, and allow their clients to control access to the encrypted data by giving them ultimate control of the keys. This includes the ability to revoke the key and render data unreadable by the SaaS vendor.
  • Vulnerability of APIs will be exposed. APIs are increasingly popular for application integration because they enable apps (and soon Internet-connected objects) to request data from each other. Yet exposing core business data and processes via APIs makes them more susceptible to hackers — increasing the risk for intrusion attacks, data theft or DOS attacks.
  • European companies migrate data from US-based cloud and SaaS providers in response to NSA Prism scandal. US-based cloud service providers including Google, Amazon and Microsoft account for approximately 85 percent of global markets. However, a recent Cloud Security Alliance survey of 500 respondents found that 56 percent of non-US residents were less likely to use US-based cloud providers in light of recent revelations about government access to customer information. In response, the EU’s European Cloud Partnership is drafting a charter to promote an EU-based digital cloud service.
  • As NSA concerns fade, data privacy concerns skyrocket. Most people and organizations will realize they’re not being targeted by the NSA; however, the residual effect of the spying scandal is that data privacy will become a scorching hot topic in 2014. A recent poll shows 86 percent of U.S. Internet users have taken steps online to remove or mask their digital footprints using a variety of methods, and more than 70 percent of E.U. citizens want to have more control over how their data is used online.
  • Major trustees of consumer data, such as Google, Yahoo and Facebook begin to offer consumer-based key management services, where the provider hosts the encryption and the end-user manages the keys to their personal data. Consumer cloud storage providers tend to design systems that emphasize recoverability over security. However, as organizations like the NSA continue to snoop on citizens, cloud services face increasing pressure to up the ante in privacy protections and data security, allowing users to hold their own encryption keys and prevent access to sensitive data that might otherwise fall subject to government subpoena.

Larry_WarnockBy Larry Warnock, President & CEO/Gazzang

Larry is responsible for Gazzang's leadership, operations and strategic direction. He brings more than 27 years of operational expertise working with startups and established technology companies to his role at Gazzang, particularly in the enterprise software, security and data center tools markets.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm ...
Analytics Will Revolutionize Supply Chains In 2018

Analytics Will Revolutionize Supply Chains In 2018

Supply Chains In 2018 While 94% of supply chain leaders say that digital transformation will fundamentally change supply chains in ...
Mobile Data Traffic Explosion: Explore IoT, 5G, & VR Opportunities

Mobile Data Traffic Explosion: Explore IoT, 5G, & VR Opportunities

Mobile Data Traffic Explosion The technology revolution of the 21st Century has opened the avenues towards many possibilities. We now ...
The Future is Bright for Banking

The Future is Bright for Banking

Banking Future 2018 is likely to be a game-changing year for the banking and finance sector. As the General Data ...
5 Top Paying IT Certifications In 2017

5 Top Paying IT Certifications In 2017

5 Top Paying IT Certifications Security-related certifications pay on average over $17,000 per year more than the median IT certification ...
Millennials’ Video Obsession

Millennials’ Video Obsession Is Transforming Your Office: Are You Adapting?

Millennials’ Video Obsession In 2016, millennials surpassed the Baby Boomers as the largest generation in American history. As they continue ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, ...
Common Cloud Mistakes - And How To Avoid Them

Common Cloud Mistakes – And How To Avoid Them

Common Cloud Mistakes One of the first lessons in order to avoid common cloud mistakes with anyone entering the tech ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...