If there is one area in which the cloud operators all agree, this is the one related to the protection of personal data. A highly strategic niche that aims to help reassure their ability to preserve the privacy of their clients. Microsoft seeks to distinguish itself from other cloud service providers to businesses by leveraging…

The experience gained by the company alongside the users of the enterprise and cloud service providers of cloud computing adds an important perspective on the challenges of security in cloud, big data and Internet of Things (IoT) environments. The non-profit Cloud Security Alliance (CSA) that aims to promote the use of best practices to ensure…

The White House released a report on big data in which it calls for an update to the Electronic Communications Privacy Act (ECPA). The much-anticipated report comes at a time when there is a large scale debate going between technology, privacy, and civil rights. The report “Big Data: Seizing Opportunities, Preserving Values” focused on how…

The economic consequences of the NSA scandal are anything but marginal. But the effects in monetary terms are only part of the problem – the point is that Edward Snowden revelations of NSA scandal has changed the perception of IT industry towards cloud computing. Nearly ninety percent of the ICT decision makers have changed their…

A recent report by UK publication The Guardian has revealed that the National Security Agency has a top secret program called PRISM, which gives them unbridled access to the systems of Facebook, Google, Apple, and other Internet giants from the US. The Guardian managed to verify the authenticity of the document, which consists of a…

Around the world, Internet users are beginning to tire of giving their personal data on the Internet and the big data information collected and monetized is headed for a clash with privacy concerns. According to tech analyst firm Ovum, netizens around the world begin to realize the amount of personal data collected. The survey conducted…

The last changes to the HIPAA Privacy, Security, Enforcement and Breach Rules had recently been released. Such rules were first implemented the summer of 2012. It also contains how cloud computing providers are to be treated by the healthcare industry. According to the HIPAA standard, the cloud vendors are business associates and as business associates…

The state of cloud computing in Japan makes for an interesting read, due to the various oddities that are present within the country with regard to the technology. For instance, the country currently comes in at first place in the BSA Global Cloud Computing Scorecard, which is a remarkable achievement considering the fact that Japan…

The findings of a survey conducted jointly by Cloud Security Alliance (CSA) and ISACA show that government regulations, exit strategies and international data privacy dominate the top 10 areas where trust in the cloud is the lowest. Studying Cloud Market Maturity conducted jointly between ISACA and CSA provides business leaders and IT knowledge on the…