{"id":12137,"date":"2015-01-05T16:00:00","date_gmt":"2015-01-05T16:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3268950"},"modified":"2015-01-05T16:00:00","modified_gmt":"2015-01-05T16:00:00","slug":"is-your-data-encryption-kosher-by-safelogic-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/is-your-data-encryption-kosher-by-safelogic-cloudexpo-cloud\/","title":{"rendered":"Is Your Data Encryption Kosher? By @SafeLogic | @CloudExpo [#Cloud]"},"content":{"rendered":"<p>Cryptography has become one of the most underappreciated, misunderstood components of technology. It\u2019s too easy for salespeople to dismiss concerns with three letters that nobody wants to question. \u2018Yes, of course, we use AES.\u2019<br \/>\nBut what exactly are you trusting to be the ultimate guardian of your data? Let\u2019s face it \u2013 you probably don\u2019t know. An organic, grass-fed Kobe steak is a far cry from a Big Mac, but they\u2019re both beef, right? Not exactly. Crypto is the same way. The US government requires all federally deployed technology to meet minimum standards. For encryption, if it hasn\u2019t been certified to meet the FIPS 140-2 benchmark, it is considered the equivalent of exposing your data in plain text. That\u2019s how crucial it is.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3268950\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography has become one of the most underappreciated, misunderstood components of technology. It&rsquo;s too easy for salespeople to dismiss concerns with three letters that nobody wants to question. &lsquo;Yes, of course, we use AES.&rsquo;<br \/>\nBut what exactly are you trusting to be the ultimate guardian of your data? Let&rsquo;s face it &ndash; you probably don&rsquo;t know. An organic, grass-fed Kobe steak is a far cry from a Big Mac, but they&rsquo;re both beef, right? Not exactly. Crypto is the same way. The US government requires all federally deployed technology to meet minimum standards. For encryption, if it hasn&rsquo;t been certified to meet the FIPS 140-2 benchmark, it is considered the equivalent of exposing your data in plain text. That&rsquo;s how crucial it is.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3268950\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-12137","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=12137"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12137\/revisions"}],"predecessor-version":[{"id":14719,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12137\/revisions\/14719"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=12137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=12137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=12137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}