The assumption that software security can stay ahead of the hackers is not true because the software security industry is always reacting to threats that hackers expose. Once hackers start exploiting a flaw in an application, security companies try to block the resulting threat by providing security updates for existing software or by developing new programs. Either...
Jurisdictions around the world, including the European Union and Canada, are enacting laws and creating regulations forcing companies that collect personally identifiable information (PII) to store the data of their residents within their national boundaries. This concept is known as data residency and the idea is that local privacy laws will apply to data stored...
August 27, 2017
Leave a comment
Personal Data Protection,
Data Sovereignty,
data residency
By Wael Aggan
American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in...
June 14, 2017
Leave a comment
Data Sovereignty,
data residency,
Cloud threats,
encryption
By CloudMask Team
Countries are establishing data residency regulation to protect private and classified data generated from their citizen by mandating storing this information within that country (the country of origin). The theory is that the laws of the country in which the data is stored apply to that data. Large cloud providers such as Amazon, Microsoft, Salesforce are opening cloud...
Tokenization is the process of replacing a sensitive data element with a random equivalent, referred to as a token that has no extrinsic or exploitable meaning. The token is a reference that maps back to the original sensitive data through a tokenization system. Both original sensitive data and token are stored encrypted in a secure database. Reversing this process by...
March 01, 2016
Leave a comment
Data Sovereignty,
Data Masking,
Tokenization,
cyber threats,
encryption
By CloudMask Team
American organizations should double down on data security with encryption and implement new data protection strategies in light of data privacy movements overseas. The Safe Harbor ruling certainly introduced a wrench into the typical enterprise's data security strategy, as it essentially dissolved a long-standing agreement between the U.S. and EU in regard to data...
October 30, 2015
Leave a comment
Personal Data Protection,
Data Sovereignty,
Compliance,
data privacy
By Wael Aggan
The safe harbor agreement is a key component of conducting business overseas, but all that has changed. Data privacy and trans-Atlantic relationships have been protected by the "safe harbor" agreement since 2000. This joint decision made by the European Union and the United States government stated that U.S.-based businesses could send EU citizens' data back to American...
October 09, 2015
Leave a comment
Personal Data Protection,
Data Sovereignty,
Compliance,
data privacy
By Wael Aggan
Law firms need to balance compliance with the cloud in an age when both are critical to success. The cloud has become a fundamental part of business, and thanks to the cost-efficiency, scalability, and agility that these systems and services offer, it won't be going away anytime soon. From storage to computing, every organization in a variety of sectors has empowered...
October 21, 2014
Leave a comment
Data Sovereignty,
Compliance,
Breach,
Legal,
Data Masking
By CloudMask Team