by Michael Boehl | Mar 30, 2020 | Amazon Web Services, Cloud, Security
As part of AWS’s standard security best practices for their Relational Database Service (RDS), a new certificate authority (CA) for RDS, Aurora and DocumentDB database instances is now available. The current CA expires on March 5, 2020, however, to avoid interruption...
by Michael Boehl | Jan 21, 2020 | CASB, Discovery and Assessment, Palo Alto, Security, VAST View
Information security doesn’t happen by throwing together a random set of tools. Information security happens after you develop a deep understanding of your data and IT resources, their value, and their vulnerabilities, and you use that understanding to develop a...
by Michael Boehl | Dec 24, 2019 | CASB, Discovery and Assessment, Palo Alto, Security, VAST View
Cloud changes some of the risks to your data’s security. Some of the traditional defenses still apply, but there’s also new technology that you’ll want to consider using to keep your data safe. Risks to Data Security in the Cloud Risks to data in the cloud come from...
by Michael Boehl | Dec 10, 2019 | Privacy, Security, Veritas
For businesses in the United States, GDPR was an eye-opener. It highlighted how different the EU attitude towards data privacy was from that at home. But that difference is getting smaller. Attitudes in the United States are shifting and getting closer to the European...
by Michael Boehl | Oct 21, 2019 | Amazon Web Services, Cloud Adoption and Migration, Cloud Management, Cloud Migration, Cost Optimization, Hybrid Cloud, Microsoft Azure, Multi-Cloud, Orchestration, Security, VAST View
Multi-cloud has become a fact of life in today’s era. More than 90% of organizations use public cloud, and more than 80% have multi-cloud environments. On average, organizations use 4.8 clouds, with enterprises running 32% of workloads in public cloud and 45% in...
by Michael Boehl | Aug 16, 2019 | Security, VAST News
In order to protect your cloud environment, it’s important to know the kinds of threats your cloud will face. Some attacks are old and familiar, just transferred to the new environment; others take advantage of vulnerabilities introduced by the cloud’s shared...