25.01.2018 Views

CIO & LEADER-Issue-10-January 2018 (1)

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

The cover story on CIO&Leader's January issue is a dive into the skills that CIOs are going to develop and hire in 2018

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

COLUMN<br />

By Rahul Kumar<br />

Cloud<br />

Security:<br />

A Case For<br />

Effective<br />

Encryption<br />

Having an effective encryption and key<br />

management solution is vital to the<br />

success of any security strategy<br />

I<br />

It has not yet reached epic proportions, but the number of organizations<br />

adopting cloud-based technologies is growing dramatically.<br />

Organizations of all sizes across industries are turning towards<br />

cloud-based infrastructure and cloud computing for better scalability,<br />

accessibility and a collaborative work environment. However,<br />

after moving to the cloud, many organizations mistakenly assume<br />

that it is the role of the cloud service provider (CSP) to secure data<br />

and ensure compliance.<br />

Even though the CSP may provide services for protecting data,<br />

organizations must understand the fact that virtual environments<br />

are not always fully secure and that they—organizations—too have a<br />

role in protecting the security and privacy of their data. Remember,<br />

the liability to notify those affected and remediate damages is on you<br />

should your company suffer a data breach!<br />

The author is Country Manager for<br />

India at WinMagic<br />

Knowing the levels of responsibility<br />

does matter<br />

When it comes to choosing between cloud infrastructure and cloud<br />

computing, companies must make the decision backed by a plan to<br />

implement the right security solution. The solution should effectively<br />

address issues such as securing data, managing risk related<br />

to unauthorized access, and meeting compliance and regulatory<br />

requirements. Remember, the cloud is subject to the same threats<br />

12 <strong>CIO</strong>&<strong>LEADER</strong> | <strong>January</strong> <strong>2018</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!