{"id":2382,"date":"2012-06-27T07:04:00","date_gmt":"2012-06-27T07:04:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2303933"},"modified":"2012-06-27T07:04:00","modified_gmt":"2012-06-27T07:04:00","slug":"securing-your-data-at-rest-in-the-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/securing-your-data-at-rest-in-the-cloud\/","title":{"rendered":"Securing Your \u2018Data at Rest\u2019 in the Cloud"},"content":{"rendered":"<p>We\u2019re all hungry for best practices and tips for securing data in the cloud and also how shared computer resources can and should work to ensure privacy and protection. The focus is on data security, especially data at rest.<br \/>\nCloud computing is all about increased scalability and productivity. However, new cloud security threats such as \u201csnapshotting\u201d a virtual disk are emerging. These create new threats to private data, compared to when data was stored and secured between the four walls of a datacenter.<br \/>\nWith cloud computing, multiple customers may share a single physical disk, although logically separated from each other. In theory, one can share the same physical disk with a competitor \u2013 without data crossing over. The same is true for physical servers. Equally, within a single cloud account, different projects may be sharing the same physical disks or physical servers. This virtualized approach is at the heart of cloud computing; it provides many of its benefits.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2303933\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re all hungry for best practices and tips for securing data in the cloud and also how shared computer resources can and should work to ensure privacy and protection. The focus is on data security, especially data at rest.<br \/>\nCloud computing is all ab&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2382","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=2382"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2382\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=2382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=2382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=2382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}