Data Security in Cloud Computing: 8 Key Concepts

| March 27, 2019

article image
Migrating to a cloud computing platform means your responsibility for data security goes up considerably. Data with various levels of sensitivity is moving out of the confines of your firewall. You no longer have control – your data could reside anywhere in the world, depending on which cloud company you use. Moving to the public cloud or using a hybrid cloud means the potential for cloud security issues is everywhere along the chain. It can happen as the data is prepped for migration, during migration, or potentially within the cloud after the data arrives. And you need to be prepared to address this every step of the way.

Spotlight

Indegy

Indegy provides situational awareness and real-time security for industrial control networks to ensure operational continuity and reliability. The Indegy platform delivers comprehensive visibility and oversight into all OT activities, including changes to controller logic, configuration and state, across all vendor devices, by utilizing control network inspection of proprietary control communications, and patent-pending agentless controller verification technology that validate PLC firmware, code and configuration.

OTHER ARTICLES

As Edge Applications Multiply, OpenInfra Community Delivers StarlingX 5.0, Offering Cloud Infrastructure Stack for 5G, IoT

Article | June 2, 2021

StarlingX—the open source edge computing and IoT cloud platform optimized for low-latency and high-performance applications—is available in its 5.0 release today. StarlingX combines Ceph, OpenStack, Kubernetes and more to create a full-featured cloud software stack that provides everything carriers and enterprises need to deploy an edge cloud on a few servers or hundreds of them.

Read More

How to Scale IT Infrastructure

Article | April 25, 2020

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More

5 Essential Principles for Managing SD-Branch Security

Article | March 5, 2020

Software-defined wide-area networking (SD-WAN) is revolutionizing the way that local branches are managed. As we’ve previously pointed out in our article on 4 things you should know about SD-Branch, it is being used to enable faster cloud adoption and greatly improve centralized control over the systems running in branch offices. Unfortunately, these advantages also come with some downsides. As SD-WAN has developed in SD-Branch, the number of IoT and end-user devices connected to these networks has grown exponentially. This means that the surface attack area of the average SD-Branch setup has increased enormously over the past few years. At the same time, business-critical applications are now sharing more data than ever over broadband internet connections, exposing critical data to interception or disruption.

Read More

How to build your IT infrastructure for 5G-enabled edge computing

Article | February 26, 2020

The global 5G-enabled edge computing market is growing rapidly, fueled by major technology changes that are disrupting the traditional networking industry. By 2025, this market is expected to exceed $50 billion. 5G has the potential to deliver a new generation of services, thanks to higher data rates and ultra-low latency. To take advantage of this potential, communications service providers are looking to move data processing and compute power closer to the end user — closer to the edge. While the digital boom provides many opportunities for IT leaders, it comes with challenges: a growing number of smart devices, the need for faster processing and increased pressure on enterprise networks. To harness all this potential power, organizations need to modernize their networks to effectively consume these new services at the edge. Some key trends are empowering this shift toward the 5G-enabled edge.

Read More

Spotlight

Indegy

Indegy provides situational awareness and real-time security for industrial control networks to ensure operational continuity and reliability. The Indegy platform delivers comprehensive visibility and oversight into all OT activities, including changes to controller logic, configuration and state, across all vendor devices, by utilizing control network inspection of proprietary control communications, and patent-pending agentless controller verification technology that validate PLC firmware, code and configuration.

Events