Meeting the requirements for cloud data security entails applying existing security techniques and following sound security practices. To be effective, cloud data security depends on more than simply applying appropriate countermeasures. Taken collectively, countermeasures must comprise a resilient mosaic that protects data at rest as well as data in motion. While the use of encryption is a key component for cloud security, even the most robust encryption is pointless if the keys are exposed or […]
security control
2 posts
The growth in popularity of web-based applications like social networking sites and even cloud computing software like Google Docs has raised more and more questions concerning security requirements. Particularly when it comes to the use of virtual and cloud environments for sensitive data hosting, rather than use of local data centres – does data protection now demand a new approach? Data protection schemes should always pursue pre-emptive tactics. In fact, nowadays it’s an essential requirement […]