Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security breaches, data processing errors, access issues and difficulty of meeting corporate or industry compliance / privacy requirements. Enterprises with a global presence are also finding they need to operate in an increasingly stricter data sharing environment. In fact, data residency policies from countries like the UK, Germany, Australlia and China can make housing data certain types of sensitive data within clouds in countries like the U.S. extremely challenging. Despite these concerns, business imperatives are pressuring many enterprise CIOs and CEOs to move large amounts of data to the... (more)

Remember These Two Important Facets of Cloud Monitoring for the Enterprise

As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I'm referring to the process of identifying cloud use within an organization and then evaluating if there are data privacy and/or compliance risks that need to be mitigated. Cloud monitoring includes the idea of fully understanding what clouds are being used and how employees are accessing and updating information, from where and when. This becomes more complic... (more)

Hopefully We Will Find Out Strong Encryption or Tokenization Was in Place…

Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the implications of this breach could be enormous. Forrester's John Kindervag was quoted in the Washington Post article I read saying that "whatever money Target thought they were going to see the holiday season just got flushed down the data breach toilet." The costs they potentially face include ever... (more)

Should Quantum Computers Cracking Encryption Matter to You?

Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryption. The NSA actually discloses they are working on quantum computing technology on their website, however, the status of the research was previously unknown. According to these new documents the agency is working on a "cryptologically useful quantum computer" as part of a research program called "Pen... (more)

Gartner Highlights Cloud Data Encryption Gateways

By Gerry Grealish PerspecSys Vice President of Marketing & Products Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled "The Current and Future State of Cloud Security, Risk and Privacy." During the presentation, Mr. Heiser highlighted what he called the "Public Cloud Risk Gap," characterized in part by inadequate processes and technologies by the cloud service providers and in part by a lack of diligence and planning by enterprises using public cloud applications. In many ways, it was a call to arms to ensure that adequa... (more)