Entries by David Berman

Recognized Leadership vs Claims of Leadership

Getting Beyond the Noise Technology products often are overhyped, and products in the CASB space are no exception. CASB players proliferate amid an abundance of venture money and self-proclaimed market and technology leadership. Customers rely on competitive analysis from independent sources to cut through the noise and provide a clear picture of what vendors really […]

Cloud Data Isn’t Lazy Data

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail […]

Does BYOK Mean ‘Barely Your Own Keys’?

3 Truths about Encryption and BYOK Many people making important decisions about data security have a fuzzy understanding of how encryption actually works. Their confusion can easily be exploited by hackers, governments, and vendors pushing incomplete solutions. That’s because, on the surface, encryption seems reasonably easy to understand with real-world analogies to keys, locks, secrets […]

3 Key Factors for Data Privacy & Enterprise Cloud Adoption

When it comes to enterprise cloud adoption, one critical risk area to understand is cloud data privacy. IT and security professionals need to evaluate the relative privacy risk of various cloud solutions in order to select the best option for their organizations. Evaluating a range of cloud data privacy risks associated with the adoption of […]

Why National Borders and Regulations are not Enough to Ensure Cloud Data Privacy

Concerns about government agencies’ surveillance of private corporations’ digital data and communications have been top of mind since U.S. government passed the Patriot Act in the wake of the 9/11 terrorist attacks. Add Edward Snowden blowing the lid off National Security Agency (NSA) domestic spying activities in 2013, and cases like the U.S. Department of […]

Pillars to Lean On: Self-Evaluation & Checklist When Evaluating CASB

If you aren’t thinking about deploying a cloud access security broker (CASB), you may be falling behind the technology curve. Gartner predicts that 85% of large enterprises will be using CASB by 2020. That’s because the growth of cloud usage is exponential, along with the associated security risks. While cloud providers offer tools to manage […]

6 Steps to Take Now that EU Safe Harbor Is Not the Only Game In Town

When the European Court of Justice invalidated the EU Safe Harbor framework, it put all data transfers based on Safe Harbor self-certification in legal limbo. While the ruling doesn’t require that those transfers cease, it means there no longer is any legal authorization for those data transfers. Without Safe Harbor, gaining approval for data transfers […]

Cloud Encryption Trends & Predictions for 2016: Taking a Proactive Approach to Data Protection

Whether or not you make New Year’s resolutions in your personal life, every business leader should review corporate plans and revise strategies for the new year. So much of business planning is about growth; it’s easy to forget about protecting your company’s valuable business assets. This includes myriad types of data organizations store, transmit, process […]

Top 4 Issues Business Leaders Have About US-EU Safe Harbor’s Demise

U.S. business leaders now need to look at other legal mechanisms for the transfer of private data from EU countries since a European court struck down the 15-year-old EU Safe Harbor privacy framework. The European Court of Justice recently ruled that ubiquitous surveillance practices by the U.S. made the agreement invalid. In October, CipherCloud held […]