Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

Living Social, the popular online discount site, recently experienced a cyber-attack affecting more than 50 million of their customers. Users with a Living Social account received an email explaining the data breach, which included hackers accessing customer user names, email addresses, birth dates and passwords. In the email to customers, Living Social asked many users to change their password immediately. While the passwords were encrypted, Living Social Chief Executive Tim O'Shaughnessy wrote "We also encourage you, for your own personal data security, to consider changing password(s) on any other sites on which you use the same or similar password(s)." Unfortunately, the other compromised personally identifiable information (PII) - user names, emails addresses and birth dates - was not encrypted, putting the personal data of millions of Living Social customers ... (more)

Implications of NSA’s Violation of Privacy Rules for US Cloud Providers

New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the "Snowden leak", showing the NSA violated its own privacy rules and overstepped its authority thousands of times in the past few years, will serve to further unsettle many enterprises abroad, even leading some to conclude that utilizing U.S. cloud applications is not worth risking unauthorized data access by the government and others. Recent repo... (more)

Why Is Cloud Security Such a Big Challenge?

For many enterprises, moving business processes and data to the cloud has become a next step for improving both operational and technological capabilities. The cost savings and efficiencies created by utilizing cloud applications continue to increase, including opportunities for more business functions to be put on the cloud. For those currently using the cloud or planning to begin or expand cloud adoption, a growing concern is cloud security and specifically this question - "Why is cloud security such a big challenge?" The Various Challenges of Cloud Security The challenges of ... (more)

Gartner Highlights the Importance of Third-Party Validation

By Gerry Grealish PerspecSys Vice President of Marketing & Products Gartner recently published a report that highlights the growing importance of Cloud Access Security Brokers - solution providers that offer unified cloud computing security platforms. This solution category includes a new class of products that Gartner terms Cloud Encryption Gateways, which encrypt or tokenize sensitive information before it leaves an organization's firewall. These solutions, if designed properly, allow organizations to maintain control of sensitive data since they replace the original "clear-text... (more)

Study Finds Cloud Security Is the Biggest Barrier to Cloud Adoption

By Gerry Grealish PerspecSys Vice President of Marketing & Products Another month brings another new study highlighting security concerns as the leading barrier to cloud uptake in the enterprise. Rather than decreasing, it seems like the concerns are going in the other direction. Security breaches (such as those at iCloud and DropBox) continue to make headline news and add fuel to the fire. The winner in this situation? On-premise solutions. Who pays? The enterprise. Actually, it pays through the nose, since expenditures for on-premise solutions can be anywhere from 3-7 times more... (more)