Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How food and beverage giants like Ritz and Diageo are showing up for the Super Bowl this year

    GLP-1 draws pharma advertisers to double down on the Super Bowl

    Despite saturated live sports calendar, Super Bowl remains north star for brands

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Tether Freezes $500 Million in Assets Linked to Turkish Gambling Ring

      February 7, 2026

      Crypto.com CEO Pivots to AI Agents, Launch Planned For Super Bowl

      February 7, 2026

      Will Solana’s Price Recovery Be Challenging? Here’s What On-Chain Signals Suggest

      February 7, 2026

      China Widens Crypto Ban to Choke Off Stablecoins and Asset Tokenization

      February 7, 2026

      CFTC Expands Crypto Collateral Pilot to Include National Trust Bank Stablecoins

      February 7, 2026
    • Technology

      How food and beverage giants like Ritz and Diageo are showing up for the Super Bowl this year

      February 8, 2026

      GLP-1 draws pharma advertisers to double down on the Super Bowl

      February 8, 2026

      Despite saturated live sports calendar, Super Bowl remains north star for brands

      February 8, 2026

      Lego is building out an in-house programmatic team

      February 8, 2026

      Forget AGI, business leaders are still trying to figure out how to make AI work

      February 7, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Taking a ‘good enough’ approach with cloud security isn’t enough
    Technology

    Taking a ‘good enough’ approach with cloud security isn’t enough

    TechAiVerseBy TechAiVerseApril 4, 2025No Comments5 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Taking a ‘good enough’ approach with cloud security isn’t enough
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Taking a ‘good enough’ approach with cloud security isn’t enough

    nobeastsofierce – Fotolia

    In the wake of the January 2025 ‘Codefinger’ attacks against AWS S3 users, Thales Rob Elliss argues that many organisations are dropping the ball when it comes to their understanding of cloud security best practice

    By

    • Rob Ellis, Thales

    Published: 03 Apr 2025

    Thanks to cloud computing, organisations of all shapes and sizes have benefitted from the flexibility of IT capacity without the cost and challenges of maintaining their own infrastructure. Hyperscale public cloud providers and SaaS tools to help with a vast array of business processes have been a particular boon for small and fast-growing organisations, helping them spin up the kind of IT resource that just a few decades ago would have taken many months and significant financial cost to build and maintain themselves.

    Forget about ‘set and forget’

    Using cloud computing effectively and safely, however, requires care. One of the big draws of cloud services, is the ability to scale resources up and down as needed. Maybe there’s a project starting for a few months that will require some data processing and analysis, or there are seasonal demands for services which need additional resource. The cloud allows businesses to meet these needs without having to pay to keep that spare capacity around. But the benefits of only paying for what’s needed are only possible if the business keeps on top of where their data is stored, and in what tier – rather than falling into the trap of setting and forgetting.

    The same applies for securing this data. Under most public cloud provider contracts there is a joint responsibility between the cloud provider and the customer for the security and availability of the stored data. This can vary widely depending on the type of service that has been procured, so it is important for all organisations to think carefully about which data is best stored where, and at what security level.

    In practice this is easier said than done. Not every organisation has the technical knowledge in place to keep on top of configuring and managing their cloud services – no matter how critical they might be to keeping the organisation running. Other may think they have security through obscurity being just one of many millions of public cloud customers – or because they’ve not experienced an attack yet, as naïve as that may be.

    Organisations may also be unclear on the details of the contracts they’ve signed – they are still legally responsible for the security of their own data, wherever it’s stored. Public cloud providers may act to quarantine affected encryption keys if a breach is discovered, but if public cloud credentials are compromised and data is held for ransom, there’s little providers are legally responsible for.

    The risks of poorly managed encryption keys

    Recent attacks on cloud storage instances underscore the importance of getting this right. One cyber crime group dubbed ‘Codefinger’, for example, have attacked at least two victims by stealing AWS customer account credentials and using the built-in encryption to lockdown their data. This is made possible by the fact that many companies aren’t regularly monitoring and auditing the encryption keys they have in place, revoking permissions for those that are no longer required.

    There are also duplication and visibility challenges, with over half (53%) of organisations still having five or more key management systems in place, according to the 2024 Thales Data Threat Report. Encryption key management needs to be taken as seriously as all the other cybersecurity measures an organisation has in place.

    Separation of duties

    Luckily, effective practices around the generation, storage and use of encryption keys have been clearly defined for some time. The strength of the keys chosen, for example, needs to align with the sensitivity of the data. Some applications may benefit from the use of RSA key pairs, so that third parties can authenticate with a public key, while the data remains encrypted with a private key.

    Maintaining a separation of duties is also advisable, so that those creating and managing the keys do not also have access to the protected data. Dividing responsibilities in this way reduces the risk of a successful attack via social engineering or credential compromise, which could then give threat actors full administrative access.  

    Tracking and coordinating the use of encryption keys is also easier if they are stored in a secure vault with specific permissions, or if a Hardware Security Module (HSM) is used to store the master keys. It’s a good idea to limit the amount of data that can be encrypted with a single key, as well as to mandate a crypto period for every key – so that newly encrypted data can only be accessed with the new key version.

    A centralised system

    When you consider that an organisation may have millions of keys and operations taking place that need managing across multiple environments and for structured and unstructured data alike, having a centralised system is the best way to apply these practices consistently and rigorously. There are also increasing numbers of regulations and standards around the world that mandate strict control over encryption keys – so these practices are no longer just a ‘nice to have’, they are in fact the table stakes for doing business.

    The value of having IT resources available anytime, anywhere via the cloud has been immeasurable for modern business, but in the race to take advantage of these services, businesses must not forget that the legal liability for the security of their data remains with them.

    Rob Elliss is EMEA vice president, data and application security at Thales.

    Read more on Cloud security


    • Security Think Tank: Securing today’s ubiquitous cloud environment


    • Security Think Tank: A user’s guide to encryption

      By: Andrew Morris


    • Why IAM systems are crucial for securing multicloud architecture

      By: Peter Allison


    • Achieving agility, collaboration and data control in the cloud

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleDanish supercomputer to drive innovation
    Next Article Microsoft at 50: Enterprise IT for the masses
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    How food and beverage giants like Ritz and Diageo are showing up for the Super Bowl this year

    February 8, 2026

    GLP-1 draws pharma advertisers to double down on the Super Bowl

    February 8, 2026

    Despite saturated live sports calendar, Super Bowl remains north star for brands

    February 8, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025657 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025245 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025148 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 8, 2026

    How food and beverage giants like Ritz and Diageo are showing up for the Super Bowl this year

    How food and beverage giants like Ritz and Diageo are showing up for the Super…

    GLP-1 draws pharma advertisers to double down on the Super Bowl

    Despite saturated live sports calendar, Super Bowl remains north star for brands

    Lego is building out an in-house programmatic team

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    How food and beverage giants like Ritz and Diageo are showing up for the Super Bowl this year

    February 8, 20262 Views

    GLP-1 draws pharma advertisers to double down on the Super Bowl

    February 8, 20262 Views

    Despite saturated live sports calendar, Super Bowl remains north star for brands

    February 8, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.