Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

We often get requests for best practices related to relational database security in the context of cloud computing. People want to install their database of choice, whether it be Oracle, MySQL, MS SQL, or IBM DB2… This is a complex question but it can be broken down by asking “what’s new in the cloud?” Many techniques that have existed for ages remain important, so let’s briefly review database security in general. Database Security in Context A database usually does not stand alone; it needs to be regarded in the light of the environment it inhabits. From the security perspective, it pays to stop and think about: Application security. The application which uses the database (“sits atop” the DB) is itself open to various attacks. Securing the application will close major attack vectors to the data, such as SQL injection Physical security. In the cloud context, it mea... (more)

Disruptive Innovations and the 'Internet of Things' | @ThingsExpo [#IoT]

Disruptive Innovations in Cloud Computing The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in social networks, and starting to use digital currencies that bypass traditional banking. Alongside these community-driven ideas, we are also seeing enormous change in business to business relationships. Cloud computing enables any size business to obtain and... (more)

Cloud Computing Security Issues and Challenges By @GiladPN | @CloudExpo [#Cloud]

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data... (more)

Securing Cloud Data from Cybercrime, Intrusion and Surveillance

By John Sotiropoulos - In my previous post  (Cloud Data, Security, Privacy & Confidentiality/ The ISV Perspective) I talked about the increasing exposure of data, the changing landscape of data confidentiality and the need to shield data rather than retreat into – largely mythical  -“safe heavens” of on premise.  When storing data in the cloud, key management becomes a critical aspect of data confidentiality and a new crop of vendors are beginning to emerge simplifying encryption and key management. Having looked at most of the new crop of cloud encryption vendors, we liked Port... (more)

MySQL in the Cloud

MySQL is probably the most popular open source database. While there is a wealth of discussion online for MySQL database encryption,doing it right in a cloud computing environment is tricky. The discussion here is quite long, and contains a lot of interesting details. So if you want a spoiler: it is possible to achieve true confidentiality for your MySQL database today; using the industry best practice which is split-key encryption. Here’s why. Cloud encryption for MySQL – Setting your goals Before talking tech, it’s actually essential to understand what your goals are, and the... (more)