Welcome!

David Stott

Subscribe to David Stott: eMailAlertsEmail Alerts
Get David Stott via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from David Stott
We’ve written before about some of the high-profile data breaches occurring in recent months – security breaches that cause some to question the safety of the cloud to store and/or process sensitive data. It seems these stories are reported with increased regularity (sometimes delayed,...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
When organizations look to protect sensitive data at rest in the cloud or in transit on the way to it, there are two primary obfuscation strategies most consider – tokenization or encryption. But some enterprises may not know the details of how these methods work or how they differ. A...
In a recent blog post, we discussed the emergence of Cloud Protection Gateways as a solution for enterprises looking to protect sensitive cloud data by keeping that data under their complete control. We started looking at the vetting process enterprises undertake when they are selectin...
As the proliferation of the cloud continues, Cloud Protection Gateways are increasingly being discussed as a way to address security issues surrounding cloud adoption. Whatever stage of cloud adoption your organization is in, a thorough vetting of the different gateways available will ...
The European Commission acknowledges that Europe must become more ‘cloud active’ to stay competitive in the global economy. And while public cloud adoption in the EU is increasing, it is fragmented in some areas and lags the US by some 3- 5 years. IDC’s recent study “Cloud in Europe: U...