Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some enterprises find themselves scrambling to implement mobile device management (MDM) technologies to address the data security concerns that go along with employees using mobile devices in everyday business. The end goal of these MDM solutions is to allow for the enterprise to securely capitalize on the benefits of mobile devices while not stifling the widely accepted bring your own device (BYOD) policy. BYOD is clearly here to stay in the workplace, as the evidence of the efficiencies, convenience and cost-effectiveness experienced by both employees and the enterprise is undisputable. ... (more)

Data Control and Data Residency

The benefits associated with adoption of the cloud are well documented and understood. Organizations cite tremendous cost savings, fast deployment times and streamlined application support and maintenance when compared to traditional on-premise software deployments. So what is holding many companies back from adopting the cloud? A recent report from Gartner entitled "Five Cloud Data Residency Issues That Must Not Be Ignored" highlights one key reason for this hesitancy - enterprises' questions and concerns about jurisdictional and regulatory control arising from a lack of clarity... (more)

Why Is Cloud Security Such a Big Challenge?

For many enterprises, moving business processes and data to the cloud has become a next step for improving both operational and technological capabilities. The cost savings and efficiencies created by utilizing cloud applications continue to increase, including opportunities for more business functions to be put on the cloud. For those currently using the cloud or planning to begin or expand cloud adoption, a growing concern is cloud security and specifically this question - "Why is cloud security such a big challenge?" The Various Challenges of Cloud Security The challenges of ... (more)

Should Quantum Computers Cracking Encryption Matter to You?

Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryption. The NSA actually discloses they are working on quantum computing technology on their website, however, the status of the research was previously unknown. According to these new documents the agency is working on a "cryptologically useful quantum computer" as part of a research program called "Pen... (more)

NIST Weighs In on the Cloud

NIST released a new publication entitled Cloud Computing Synopsis & Recommendations (Special Publication 800-146) that describes in detail the current cloud computing environment, explains the economic opportunities and risks associated with cloud adoption, and openly addresses the security and data privacy challenges. NIST makes numerous recommendations for companies or agencies considering the move to the cloud (including delivering a strong case for uniform management practices in the data security and governance arenas). The report highlights several reasons why cloud-based... (more)