Welcome!

David Stott

Subscribe to David Stott: eMailAlertsEmail Alerts
Get David Stott via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by David Stott

The European Commission acknowledges that Europe must become more ‘cloud active’ to stay competitive in the global economy. And while public cloud adoption in the EU is increasing, it is fragmented in some areas and lags the US by some 3- 5 years. IDC’s recent study “Cloud in Europe: Uptake, Benefits, Barriers, and Market Estimates” assesses the European cloud market, identifies key cloud barriers, and makes straightforward recommendations on how to remove them. IDC surveyed European business users and consumers and discovered that a full 64% of EU businesses currently use the cloud, and an additional 25% are planning or thinking about it. Those that use cloud applications now, want to expand. So what’s stopping the cloud from colossal growth in Europe? The research uncovered 12 key obstacles ranging from data residency and security issues to slow performance and ... (more)

Misconceptions or Business Realities?

IDC Canada recently published a study highlighting how IT security fears may be inhibiting Canadian enterprises’ business agility and competitiveness. IDC and TELUS Enterprise Cloud Study, 2012: Three Misconceptions Curb Competitiveness sheds light on the concerns of leading Canadian businesses reluctant to implement nontraditional IT delivery methods, including public cloud-based SaaS applications, despite evidence these solutions can improve productivity, efficiency, and adaptability. Based on IDC’s research, more than 85% of the Canadian enterprises surveyed have significant c... (more)

Tokenization & Encryption – Two Data Security Methods for the Cloud

When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider - tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ. The Tokenization Process A newer technology, tokenization is the process of taking a sensitive data field and replacing it with a surrogate value called a token. De-tokenization is the reverse process of replacing a token with its associated clear text value. The Encryption Process Encryption uses a c... (more)

Two Ways Data Breaches Are Driving Change in Cloud Security

We've written before about some of the high-profile data breaches occurring in recent months - security breaches that cause some to question the safety of the cloud to store and/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed, as in the case of AT&T this month). In fact, Fierce CIO recently called the number of breaches reported this year an "epidemic." While not all breaches are created equal in their impact, there are sometimes severe consequences for the business or the end consumer. In response, many enterprises, in... (more)

Impact of the Allegations Surrounding the NSA Spying on Cloud Privacy

The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA's activity first came to light, many in Europe called for stricter protection of EU data and privacy rights. But now, Merkel is calling for stronger Internet technology in Germany, specifically to address the fact all major data centers are in the U.S. and China. It isn't clear exactly how these late... (more)