{"id":12418,"date":"2015-02-05T17:00:00","date_gmt":"2015-02-05T17:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3293680"},"modified":"2015-02-05T17:00:00","modified_gmt":"2015-02-05T17:00:00","slug":"a-guide-to-the-cios-toolbox-by-vormetric-cloudexpo-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/a-guide-to-the-cios-toolbox-by-vormetric-cloudexpo-cloud\/","title":{"rendered":"A Guide to the CIO\u2019s Toolbox By @Vormetric | @CloudExpo [#Cloud]"},"content":{"rendered":"<p>In my blog from September 2014, I wrote \u201cencryption and access controls are your front-line defenses for defending data-at-rest. Given today\u2019s threat environment, encrypt everything possible, everywhere possible.\u201d While lots of things change in 6 months \u2013 the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking \u2013 this recommendation remains constant.<\/p>\n<p>Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015 Insider Threat Report, the insider threat landscape is becoming more difficult to deal with as the range of miscreant\u2019s moves beyond employees and privileged IT staff. It now includes outsiders who have stolen valid user credentials; business partners, suppliers, and contractors with inappropriate access rights; and third-party service providers with excessive admin privileges. Unless properly controlled, all of these groups have the opportunity to reach inside corporate networks and steal unprotected data.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3293680\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my blog from September 2014, I wrote &ldquo;encryption and access controls are your front-line defenses for defending data-at-rest. Given today&rsquo;s threat environment, encrypt everything possible, everywhere possible.&rdquo; While lots of things change in 6 months &ndash; the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking &ndash; this recommendation remains constant.<\/p>\n<p>Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015 Insider Threat Report, the insider threat landscape is becoming more difficult to deal with as the range of miscreant&rsquo;s moves beyond employees and privileged IT staff. It now includes outsiders who have stolen valid user credentials; business partners, suppliers, and contractors with inappropriate access rights; and third-party service providers with excessive admin privileges. Unless properly controlled, all of these groups have the opportunity to reach inside corporate networks and steal unprotected data.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3293680\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-12418","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=12418"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/12418\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=12418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=12418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=12418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}