Data security is always a hot topic among IT industry pundits

Data security is always a hot topic

Data security is always a hot topic among IT industry pundits, but I believe 2013 will go down as the year security crawled out of the basement and into the cultural zeitgeist.

Edward Snowden and the NSA spying revelations may have been the biggest tech story of the year. And mass data breaches at Twitter, Facebook, Adobe and The New York Times (just to name a few) were PR nightmares that raised the profile of data security — particularly in the cloud — as a recurring topic of conversation in the boardroom.

No doubt today’s breaking news will define many of tomorrow’s innovative technologies. We’re watching these developments closely at Gazzang and continuing to evolve and enhance our solutions to meet the growing needs of enterprises in the cloud and with big data.

As we close the book on 2013, I’d like to share a few cloud security-related predictions:

  •  SaaS vendors will offer encryption keys revocable by end users. SaaS providers understand they have an obligation to protect sensitive data on behalf of their clients. I believe more cloud vendors will provide encryption, and allow their clients to control access to the encrypted data by giving them ultimate control of the keys. This includes the ability to revoke the key and render data unreadable by the SaaS vendor.
  • Vulnerability of APIs will be exposed. APIs are increasingly popular for application integration because they enable apps (and soon Internet-connected objects) to request data from each other. Yet exposing core business data and processes via APIs makes them more susceptible to hackers — increasing the risk for intrusion attacks, data theft or DOS attacks.
  • European companies migrate data from US-based cloud and SaaS providers in response to NSA Prism scandal. US-based cloud Service Providers including Google, Amazon and Microsoft account for approximately 85 percent of global markets. However, a recent Cloud Security Alliance survey of 500 respondents found that 56 percent of non-US residents were less likely to use US-based cloud providers in light of recent revelations about Government access to customer information. In response, the EU’s European Cloud Partnership is drafting a charter to promote an EU-based digital cloud service.
  • As NSA concerns fade, data privacy concerns skyrocket. Most people and organizations will realize they’re not being targeted by the NSA; however, the residual effect of the spying scandal is that data privacy will become a scorching hot topic in 2014. A recent poll shows 86 percent of U.S. Internet users have taken steps online to remove or mask their digital footprints using a variety of methods, and more than 70 percent of E.U. citizens want to have more control over how their data is used online.
  • Major trustees of consumer data, such as Google, Yahoo and Facebook begin to offer consumer-based key management services, where the provider hosts the encryption and the end-user manages the keys to their personal data. Consumer cloud storage providers tend to design systems that emphasize recoverability over security. However, as organizations like the NSA continue to snoop on citizens, cloud services face increasing pressure to up the ante in privacy protections and data security, allowing users to hold their own encryption keys and prevent access to sensitive data that might otherwise fall subject to government subpoena.

By Larry Warnock

Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...
Louis
Why cybersecurity spending Is resilient Cybersecurity tech stacks must close the gaps that leave human and machine endpoints, cloud infrastructure, hybrid cloud and software supply chains vulnerable to breaches. The projected fastest-growing areas of cybersecurity ...
Dana Gardner
Low-code Development Has Entered a Maturity Spurt Closing the gap between the applications and services a company needs -- and the ones they can actually produce -- has long been a missing keystone for attaining ...
Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.