Skip to main content

Posts

Showing posts with the label data protection

Shutdown in the Cloud !

Recently there have been a few Shutdowns of Cloud Services with short notice periods which have forced customers to scurry for cover and in some cases customers have been caught in a bind Shutdown in the Cloud will be an eventuality when companies cannot scale in the cloud and remain profitable, they get choked for cash and suffer slowly leading to instant death within weeks after they are choked of funds. How do we handle Shutdown's in the Cloud will be the next domain for Risk Management in the Cloud. Though outright it looks straightforward and it appears we can apply the same matrix as we would to technology vendors, but this may not be the right approach. There are various dimension of Risk to be associated and constant monitoring of the health of the vendors is essential in the fast changing landscape of technology vendors which is pitted with risk and unexpected twists and turns. Why Cloud computing, we seem to forget how Tandem, Digital was snapped up by Compaq in mont...

Secure Data in the Cloud and Internet are Misplaced Concerns

There has been widespread attack on security of data and there has been a clamor to bring back data into the data centers and set the clock back on cloud computing and the internet. This has been driven by panic and a lack of understanding by many on the risks associated with data in motion, any data in motion is vulnerable to attack and capture whether encrypted or otherwise. Data in motion can be in device and more importantly a network whether private or internet, the risks are compounded based on the medium in which data is in motion. Any  government requesting data and data encryption security features like keys and algorithms do so to secure and protect the country. The governments primary business is to protect its citizens in a complex world run on digital technology and it is every citizens duty to cooperate with the government . Do not allow your cloud computing plans to wilt, there is a bouquet of security strategies to protect your data. There are ...