Welcome!

Cloud Security Authors: Liz McMillan, Elizabeth White, Pat Romanski, Zakia Bouachraoui, Yeshim Deniz

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Feed Post

Why Does the Cloud Attract Hackers?

Why Does the Cloud Attract Hackers?

Cloud Security Breaches and How to Avoid Them

The cloud is expanding. More applications are being run online. More data is being stored online. More businesses are relying on public, private, and hybrid clouds for their apps, records, and backups. And more hackers are taking advantage.

Why Security Breaches Happen in the Cloud

Hackers aren’t attacking the cloud; the cloud is their access point to attack your business. CIO.com found that 85% of IT professionals are confident in the cloud provider’s ability to provide a secure environment. CompTIA’s Annual Information Security Trends found that only 29% of IT users heavily review their cloud provider’s security policies, procedures, and capabilities.

cloud security breaches cloud security best practices Cloud Key Management Cloud Encryption  infosec institute Cloud Security Breaches and How to Avoid Them

The numbers speak volumes: 85% of us are confident in the cloud provider’s ability to secure our data; yet only 29% of us heavily review that same ability. Cloud providers like Amazon Web Services and VMware are wonderful organizations who make security a top priority. However, blind trust in anyone but yourself is bad business practice. Let me explain . . .

Cloud Security Risks

The CSA’s “Notorious Nine” cloud computing threats define the risks of cloud computing. Though the list includes important considerations like data loss, account or service traffic hijacking, denial of service, and others, first on the list is data breaches.

Why Does the Cloud Attract Hackers?

Because they can easily infiltrate multiple targets. A research paper published by university computer scientists and researchers from RSA Laboratories devised a virtual machine that can extract private cryptographic keys stored on a separate virtual machine when it resides on the same piece of hardware. It can be even easier than that – if a multitenant cloud service database isn’t designed properly, a single flaw in one client’s application could allow an attacker to get at not just that client’s data, but every other clients’ data as well.

Is There a Way to Ensure Data Security in the Cloud?

There is. It takes 3 steps.

  1. Verify Cloud Provider’s Security Protocols

    Only use providers who are proactive (not reactive) about their cloud security. Amazon, VMware, and IBM are great examples. They should constantly be examining weaknesses and vulnerabilities in the platform.

    Get proof that your cloud provider’s architecture and systems have been audited, giving you peace of mind that the systems meet regulatory compliance even if you are not required to meet these regulations yourself. Ask if the cloud provider is FISMA-certified (indicating a high level of commitment to data security), and whether they are certified for compliance with PCI DSS, ISO 27001, HIPAA, and FIPS 140-2.

  2. Do Not Trust Anyone But Yourself

    Always remember, regardless of the security protocols of your cloud provider, the business that owns the data is responsible for its cloud security. Make sure you can encrypt your own data and use the industry’s strictest standards to do so. Always use split key encryption to ensure that only you have access to your data. By using this technology, even if an attacker gets in, your data will be unreadable and they can move on to someone else.

    Take your security to the next level by homomorphically encrypting your encryption keys. This way, even while keys are in use in the cloud, they cannot be hacked.

  3. Test

    Run vulnerability scans and/or full penetration tests regularly. You may even want to hire a firm to do so. This way, you can be sure that hackers cannot access your records and rest easy knowing that even if they do gain access, your encryption will render your data useless to them.

Cloud Security Breaches: Avoidance and Protection

Breaches happen every day and they are detrimental to business (just ask the CIO of Target). But that is no reason to stay earthbound and delay your migration to the cloud. First, breaches happen in datacenters too. Second, the cloud’s benefits are tremendous, and there are great providers out there and ways to avoid breaches and protect yourself in the event that a breach does occur.

The post Cloud Security Breaches and How to Avoid Them appeared first on Porticor Cloud Security.

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...