Containers and Microservices Help Governments in Norway Provide Safe Public Data Distribution

Containers and Microservices Help Governments in Norway Provide Safe Public Data Distribution

Containers and Microservices Dana Gardner: Hello, and welcome to the next edition of the BriefingsDirect Voice of the Customer podcast series. I’m Dana Gardner, Principal Analyst at Interarbor Solutions, your host and moderator for this ongoing discussion on digital transformation success stories. Stay with us
How Zero Trust Security Fuels New Business Growth

How Zero Trust Security Fuels New Business Growth

Bottom Line: Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses. The

Data Insecurity In The Cloud

Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest to who has access to your data in the public cloud models you use and most importantly that your customer’s data has not been tampered with, corrupted, or leaked?

The New Data Economy

We are moving towards a data economy, where data is a core component of the value of the service or product that is delivered to the customer. In our hyper-connected world data streams are becoming far more personal and intimate than previously. Consider a connected bathroom scale where weight loss or gain patterns might be transmitted from a scale to a backend cloud and where as part of the product, customers have the ability to study their weight patterns over periods of time.

Despite a widespread recognition in the industry of the value and importance of customer data, we live in a perpetual state of data insecurity. It’s not only about the high profile data breaches but it’s also about minimizing accidental risk vectors. In the cloud well intentioned employees who don’t consider the ramifications of oversharing on social media sites, or who accidentally drag and drop sensitive documents from their desktops into email or who upload regulated data into insecure file shares to avoid corporate security measures may be your organization’s biggest risk vector.

Internal Data Marketplace

At the CloudExpo Asia conference last week I referred to the sliver lining in the data insecurity issue. The effects of data loss, misuse and leakage are driving a very necessary change across the business landscape and executives are beginning to get educated on data security issues.

Following are three key steps I recommend to executives as they look to beef up their data security programs with a lens on public cloud

1. Build an internal data marketplace: Organizations need to know the value of their data in order to make the right decisions about whether to host or transact their data in a particular cloud model, and thereafter how to protect it. To calculate the value of data, build an internal marketplace with user entitlements and access controls mapped accordingly. This encourages business users to treat data as part of the business P&L.

2. Learn from your data insecurity history: Organizations have a tendency to want to bury the past especially when it hasn’t been stellar. However, knowing how data has been used and abused in the past is an indicator of how it might be compromised and disclosed in the future. Studying loss trends over time can help organizations forecast future losses and improve prevention and mitigation strategies.

3. Make data protection business-consumable: This is a recurring theme in my writings. As business leaders rush to adopt new cloud applications security needs to partner much more strategically. The way that security classifies and treats data has to align to business and usage contexts. It’s protecting data, transactions and workstreams versus focusing only on building secure and compliant infrastructures that will help organizations win and retain customer trust in the long run.

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

BRANDED COMICS FOR YOUR NEXT CAMPAIGN

Get in touch with us regarding our introductory rates!

The Benefits of Virtualizing SD-WAN and Security

The Benefits of Virtualizing SD-WAN and Security

Benefits of Virtualizing SD-WAN As more companies adopt SD-WAN technology to enhance the agility of their networking architecture, they must ...
Technology Cloud Contributor

IoT Data Centers – “We’ve Always Done IoT, We’re Just Terrible At Marketing It”

IoT Data Centers An often repeated phrase by many data center professionals is “We’ve always done IoT, we’re just terrible ...
The Current Wave of Smart Home Technology

The Current Wave of Smart Home Technology

The Future of Smart Home Technology Some say the vision of smart homes kicked off with the invention of household ...
The Top 7 Latest DevOps Trends to Follow in 2019

The Top 7 Latest DevOps Trends to Follow in 2019

DevOps Trends to Follow Awareness of the latest DevOps trends is important for companies which consider the integration of DevOps ...
5 Simple Tips to Help Avoid Ransomware

5 Simple Tips to Help Avoid Ransomware

5 Tips to Avoid Ransomware Ransomware is a particularly pernicious form of malware: unsatiated by simply using your system as ...

Empathy: The Link Between Organizational Change and Intelligent Evolution

/
Even the smallest update to a process, product feature, or policy can throw people off. But nowadays, the workforce is in a constant state of evolution fueled by technology and internal transformation. Leadership ...

How UnitedHealth Group Is Infusing Deep Learning Into Healthcare Services

/
In a massive healthcare organization, even a small improvement in workflow can translate to major gains in efficiency. That means lower costs for the healthcare provider and better, faster care for patients ...

Accenture Opens Federal Cyber Center in San Antonio

/
ARLINGTON, Va.; April 17, 2019 – Accenture (NYSE: ACN) has launched the Accenture Federal Services (AFS) Cyber Center, a state-of-the-art facility in San Antonio that provides cybersecurity capabilities on an ...