{"id":11349,"date":"2014-08-27T16:00:00","date_gmt":"2014-08-27T16:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3162950"},"modified":"2014-08-27T16:00:00","modified_gmt":"2014-08-27T16:00:00","slug":"cloudexpo-protecting-data-in-the-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloudexpo-protecting-data-in-the-cloud\/","title":{"rendered":"@CloudExpo | Protecting Data in the #Cloud"},"content":{"rendered":"<p>The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and forth. Maintaining data integrity is paramount.<br \/>\nToday\u2019s approach to security in the cloud may not be sufficient; it doesn\u2019t focus on putting controls close to data, which is now more fluid, and it doesn\u2019t discriminate one set of data from another. All data is not created equal and should not be treated in the same manner; a one-size fits all model doesn\u2019t work.<br \/>\nIn this always-connected world, protection measures in the cloud need to focus on what really matters \u2013 the type of data, how it is used, and where it goes. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3162950\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cloud plays an integral role in enabling the agility required to take advantage of new business models and to do so in a very convenient and cost-effective way. However, this also means that more personal information and business data will exist in the cloud and be passed back and forth. Maintaining data integrity is paramount.<br \/>\nToday&rsquo;s approach to security in the cloud may not be sufficient; it doesn&rsquo;t focus on putting controls close to data, which is now more fluid, and it doesn&rsquo;t discriminate one set of data from another. All data is not created equal and should not be treated in the same manner; a one-size fits all model doesn&rsquo;t work.<br \/>\nIn this always-connected world, protection measures in the cloud need to focus on what really matters &ndash; the type of data, how it is used, and where it goes. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3162950\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11349","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11349"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11349\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}