Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

The latest reports surrounding the surveillance programs of the NSA and their International counterparts reveal that these agencies have been able to decode the encryption methods some enterprises and organizations use to keep their online data private. While these headlines are likely disconcerting for those operating in the U.S. or using software applications from cloud providers, as stated in our recent press release and blog post, enterprises do not need to allow their fears to slow down or stop their cloud adoption. Methods for Securing Data Online More attention has been turning to tokenization recently as a strong approach to secure sensitive data. Tokenization, like encryption, encodes or conceals data so it is protected from unauthorized parties. But unlike encryption, in which a mathematical link back to the original data's true form still exists; tokeniz... (more)

When Mobile Device Management Isn’t Good Enough

Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some enterprises find themselves scrambling to implement mobile device management (MDM) technologies to address the data security concerns that go along with employees using mobile devices in everyday business. The end goal of these MDM solutions is to allow for the enterprise to securely capitalize on th... (more)

Data Control and Data Residency

The benefits associated with adoption of the cloud are well documented and understood. Organizations cite tremendous cost savings, fast deployment times and streamlined application support and maintenance when compared to traditional on-premise software deployments. So what is holding many companies back from adopting the cloud? A recent report from Gartner entitled "Five Cloud Data Residency Issues That Must Not Be Ignored" highlights one key reason for this hesitancy - enterprises' questions and concerns about jurisdictional and regulatory control arising from a lack of clarity... (more)

What PRISM & NSA Surveillance Mean for Enterprise Data on the Cloud

With recent revelations about NSA surveillance programs including PRISM and now XKeyscore, many organizations are concerned about the privacy of customer data and other sensitive business information being put on the cloud. Some are predicting that the public uncovering of these programs will lead to a decrease in use of U.S. cloud providers. It's been reported though, that other countries are obtaining information from the NSA's surveillance, including the UK, and there are regularly stories about China and Russia maintaining similar surveillance programs, making the avoidance o... (more)

Implications of NSA’s Violation of Privacy Rules for US Cloud Providers

New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the "Snowden leak", showing the NSA violated its own privacy rules and overstepped its authority thousands of times in the past few years, will serve to further unsettle many enterprises abroad, even leading some to conclude that utilizing U.S. cloud applications is not worth risking unauthorized data access by the government and others. Recent repo... (more)