Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

The Porticor Agent enables you to encrypt disks on your server, using Porticor’s highly secure key management technology. The Agent connects to a key management appliance – a Porticor virtual machine deployed in your cloud account, which is responsible to safeguard your master key so that you do not have to trust anybody else with your keys, not even Porticor. The Agent is provisioned with an API key, which allows it to access its own managed crypto keys, but not the master key. All disk encryption takes place locally on the server that runs the Agent, and the disk-encryption keys are split between the key management appliance and the Porticor Virtual Key Management (PVKM) service. Installing the Agent Download the agent from this link (for Debian/Ubuntu) or this link (for RHEL, CentOS or Amazon Linux). Install the package on your application server: On Ubuntu, run ... (more)

Top Cloud Security Threats

To say that cloud security for cloud computing is gaining traction would be the understatement of our era.  Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud.  Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base.  What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing? But, there are dangers in the ... (more)

MySQL in the Cloud

MySQL is probably the most popular open source database. While there is a wealth of discussion online for MySQL database encryption,doing it right in a cloud computing environment is tricky. The discussion here is quite long, and contains a lot of interesting details. So if you want a spoiler: it is possible to achieve true confidentiality for your MySQL database today; using the industry best practice which is split-key encryption. Here’s why. Cloud encryption for MySQL – Setting your goals Before talking tech, it’s actually essential to understand what your goals are, and the... (more)

Crypto in the Cloud Secures Data in Spite of Providers

With companies increasingly worried about their data in the cloud, a number of providers have cropped up to offer various types of encryption Many studies have shown a chasm between cloud service providers and their customers regarding who is responsible for the security of the customer’s data: The providers put the responsibility in the hands of the customer, but the customer usually disagrees. According to a study conducted by the Ponemon Institute last year, for example, nearly seven in 10 cloud providers put responsibility for the security of a customer’s data with the custom... (more)

Cloud Security and the Omnibus HIPAA

The new and enhanced HIPAA omnibus standard brings an interesting question with regards to cloud security and the shared responsibility model in IaaS clouds. Since the release of the HIPAA omnibus, we’ve received many questions around “BAA” agreements, and how the responsibility split actually happens between (for example) the cloud provider and an ISV providing a healthcare application in an IaaS environment. Cloud HIPAA compliance still requires a shared responsibility model Without getting to the details of what a “Business Associate Agreement” means, I’ll simply say that the u... (more)