{"id":11017,"date":"2014-07-04T19:00:00","date_gmt":"2014-07-04T19:00:00","guid":{"rendered":"https:\/\/cloudcomputing.sys-con.com\/node\/3114773"},"modified":"2014-07-04T19:00:00","modified_gmt":"2014-07-04T19:00:00","slug":"two-ways-data-breaches-are-driving-change-in-cloud-security-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/two-ways-data-breaches-are-driving-change-in-cloud-security-2\/","title":{"rendered":"Two Ways Data Breaches Are Driving Change in Cloud Security"},"content":{"rendered":"<p>We\u2019ve written before about some of the high-profile data breaches occurring in recent months \u2013 security breaches that cause some to question the safety of the cloud to store and\/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed, as in the case of AT&#038;T this month). In fact, Fierce CIO recently called the number of breaches reported this year an \u201cepidemic.\u201d<br \/>\nWhile not all breaches are created equal in their impact, there are sometimes severe consequences for the business or the end consumer. In response, many enterprises, industries and nations are instituting stricter regulations, better security and more severe penalties for infringements \u2013 all in hopes of mitigating the risks of placing data on the cloud.<\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/3114773\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&rsquo;ve written before about some of the high-profile data breaches occurring in recent months &ndash; security breaches that cause some to question the safety of the cloud to store and\/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed, as in the case of AT&amp;T this month). In fact, Fierce CIO recently called the number of breaches reported this year an &ldquo;epidemic.&rdquo;<br \/>\nWhile not all breaches are created equal in their impact, there are sometimes severe consequences for the business or the end consumer. In response, many enterprises, industries and nations are instituting stricter regulations, better security and more severe penalties for infringements &ndash; all in hopes of mitigating the risks of placing data on the cloud.<\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/3114773\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11017","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11017"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11017\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}