Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some enterprises find themselves scrambling to implement mobile device management (MDM) technologies to address the data security concerns that go along with employees using mobile devices in everyday business. The end goal of these MDM solutions is to allow for the enterprise to securely capitalize on the benefits of mobile devices while not stifling the widely accepted bring your own device (BYOD) policy. BYOD is clearly here to stay in the workplace, as the evidence of the efficiencies, convenience and cost-effectiveness experienced by both employees and the enterprise is undisputable. ... (more)

The Criminal Justice System and the Cloud

As with other industries, the daily operations of law enforcement and criminal justice organizations rely heavily on obtaining, holding and sharing sensitive data. The FBI's Criminal Justice Information System (CJIS) is responsible for providing many critical pieces of data that criminal justice organizations and contractors need to conduct business every day - including fingerprint records, sex offender registries and criminal histories. There are understandably strict regulations and standards for anyone accessing CJIS data and this applies to any cloud application provider or ... (more)

Government Agencies Decoding Encryption – How to Keep Cloud Data Private

The latest reports surrounding the surveillance programs of the NSA and their International counterparts reveal that these agencies have been able to decode the encryption methods some enterprises and organizations use to keep their online data private. While these headlines are likely disconcerting for those operating in the U.S. or using software applications from cloud providers, as stated in our recent press release and blog post, enterprises do not need to allow their fears to slow down or stop their cloud adoption. Methods for Securing Data Online More attention has been t... (more)

The Security of Popular Cloud Storage Sites

For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the major providers (Box, DropBox, SkyDrive), for the purpose of illustration I'll focus on DropBox since it is arguably the most popular site boasting over 100 million users. Here is where some of the concerns begin; DropBox experienced a major security breach in July 2012, specifically involving user pa... (more)

The Future of the EU-US Safe Harbor Data Privacy Policy

Last year's revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recommendation was followed, the implications for businesses would be dramatic. U.S. companies would no longer be able to enjoy the simplified data sharing policy currently in place for those that are able to meet EU requirements to earn Safe Harbor certification. Certified companies are able to transfer ... (more)