Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Gerry Grealish
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
Like millions of other Americans, I learned the other night about the massive data breach at Target. The Washington Post is reporting that sensitive details on over 40 million credit and debit cards were exposed. While the information associated with the crime is still coming out, the ...
When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches. Of course I think of the cloud when discussing security. In the contemporary world...
For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the maj...
The latest reports surrounding the surveillance programs of the NSA and their International counterparts reveal that these agencies have been able to decode the encryption methods some enterprises and organizations use to keep their online data private. While these headlines are likel...
For many enterprises, moving business processes and data to the cloud has become a next step for improving both operational and technological capabilities. The cost savings and efficiencies created by utilizing cloud applications continue to increase, including opportunities for more b...
New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the “Snowden leak”, showing the NSA violated its own ...
With recent revelations about NSA surveillance programs including PRISM and now XKeyscore, many organizations are concerned about the privacy of customer data and other sensitive business information being put on the cloud. Some are predicting that the public uncovering of these progra...
For most enterprises, cost savings and increased efficiencies are the primary motivations for making the move to cloud computing. But recent studies from Gartner and other firms have identified concerns over cloud security and data privacy as being the leading barriers to cloud adoptio...
Just a few months ago I wrote a blog post about healthcare data on the cloud (HIPPA Cloud Storage) and the security concerns surrounding this very sensitive and valuable data. I mentioned that as with many industries, more healthcare data is being moved to the cloud, but the healthcare...
Australian Government agencies have some new regulations to consider when they are contemplating moves to the cloud, particularly clouds hosted outside of Australian borders. These guidelines, known as “The Australian Government policy and risk management guidelines for the processing ...
As with other industries, the daily operations of law enforcement and criminal justice organizations rely heavily on obtaining, holding and sharing sensitive data. The FBI’s Criminal Justice Information System (CJIS) is responsible for providing many critical pieces of data that crimin...
For many organizations, cloud computing has become an integral part of their everyday business. Many companies are relying on cloud applications for fundamental operations such as CRM and email and are looking to increase utilization of the cloud for other functions. For others, adopti...
The convenience, efficiency and cost benefits cloud computing offers organizations has made moving healthcare data and records to the cloud make sense for hospitals, physicians and other healthcare providers. Security and data breaches are a concern for any industry utilizing the cloud...
The benefits associated with adoption of the cloud are well documented and understood. Organizations cite tremendous cost savings, fast deployment times and streamlined application support and maintenance when compared to traditional on-premise software deployments. So what is holding ...
Recently, McKinsey & Company released an article entitled Protecting information in the cloud which discussed the increased use of cloud computing by enterprises of a variety of sizes and industries and the benefits and risks cloud usage entails. The article recognizes that many organi...
Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled “The Current and Future State of Cloud Security, Risk and Privacy.” During the presentation, Mr. Heiser highlighted what he called the “Public Cloud Risk Gap,” characterized ...
Earlier this week, the Massachusetts Eye and Ear Infirmary and Massachusetts Ear and Eye, Inc. (MEEI) agreed to pay a hefty $1.5 million settlement to the U.S. Department of Health & Human Services for alleged HIPAA violations. According to MEEI, a personal laptop that contained unencr...
Gartner recently published a report that highlights the growing importance of Cloud Access Security Brokers – solution providers that offer unified cloud security platforms. This solution category includes a new class of products that Gartner terms Cloud Encryption Gateways, which encr...