What the CISO Should Know About Protecting Encryption Keys In Cloud Environments

For decades, encryption key management provided by hardware security modules (HSM) has been the foundation for data security, but as companies move to the cloud they often find the HSM on-premises data encryption model does not efficiently serve the needs of protecting encryption keys in cloud environments. As enterprises contend with security threats CISOs are looking for simpler, standardized methods of securing data.

Is Hybrid Cloud Security Nirvana Possible?

In my latest blog post, “Cloud Security: ‘How’ Not ‘If,’” I discussed ways organizations have addressed cloud security issues, including hybrid cloud scenarios that keep sensitive data private. But is it really possible to make the entire hybrid cloud so secure that application workloads and data can travel at will and realize the best combination of safety, performance, agility and return on investment? Can we reach this hybrid cloud security nirvana?