<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cloud data Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/cloud-data/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/cloud-data/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Tue, 28 Apr 2020 09:08:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Microsoft Azure, Intel Keep Cloud Data Confidential</title>
		<link>https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/</link>
					<comments>https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 09:08:52 +0000</pubDate>
				<category><![CDATA[Microsoft Azure Machine Learning]]></category>
		<category><![CDATA[cloud data]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=8392</guid>

					<description><![CDATA[<p>Source: sdxcentral.com Microsoft today made available Azure confidential computing built on Intel hardware for enterprise cloud customers. It follows a similar IBM Cloud move last week. The <a class="read-more-link" href="https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/">Microsoft Azure, Intel Keep Cloud Data Confidential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: sdxcentral.com</p>



<p>Microsoft today made available Azure confidential computing built on Intel hardware for enterprise cloud customers.</p>



<p>It follows a similar IBM Cloud move last week.</p>



<p>The new Azure DCsv2-Series allows companies to process data in the cloud in hardware-based secure enclaves called trusted execution environments (TEEs). Intel calls its TEEs Software Guard Extensions (SGEs). This hardware-based technology isolates specific application code and data to run in private regions of memory, thus protecting select code and data from disclosure or modification even at the OS and hypervisor level.</p>



<p>Encrypting data while it’s being processed in memory “helps to isolate the data from other applications or tenants, the service provider, rogue administrators, and even from malicious code with root privileges,” wrote Jason Grebe, VP and GM of Intel’s Cloud and Enterprise Solutions Group in a blog post.</p>



<h3 class="wp-block-heading">Confidential Computing Heats Up</h3>



<p>Both Intel and Microsoft are also founding members of the Confidential Computing Consortium. The Linux Foundation formed the open source group last August, and at its launch Intel contributed its SGX software development kit (SDK) to the project. Meanwhile, Microsoft contributed Open Enclave SDK, which is an open source framework that allows developers to build TEE applications using a single enclaving abstraction.</p>



<p>The two companies have been working on Azure confidential computing for several years, and a little over two years ago they rolled out the first public preview of the service. Microsoft claims Azure was the first public cloud to encrypt data while in use, and its engineers helped design the SGX technology used in Intel’s Xeon chips.</p>



<p>At Intel’s Security Day event in February, Senior Director of Microsoft Azure Security Scott Woodgate joined Intel execs on stage to discuss new use cases that confidential computing enables. These include multi-party or federated machine learning. During a later interview at RSA conference, Woodgate said several Microsoft customers use multi-party machine learning to detect banking fraud and money laundering.</p>



<p>IBM is also working on confidential computing use cases with its banking and health care customers, said Nataraj Nagaratnam, CTO and director of cloud security for IBM’s Cloud and Cognitive Software business unit.</p>



<p>That cloud provider last week announced that IBM Cloud Data Shield now supports containerized applications on IBM Cloud Kubernetes and RedHat OpenShift using Intel SGX hardware and Fortanix encryption technology.</p>
<p>The post <a href="https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/">Microsoft Azure, Intel Keep Cloud Data Confidential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/microsoft-azure-intel-keep-cloud-data-confidential/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Amazon Macie automates cloud data protection with machine learning</title>
		<link>https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/</link>
					<comments>https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 18 Aug 2017 09:37:56 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[cloud data]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[CloudTrail]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=666</guid>

					<description><![CDATA[<p>Source &#8211; csoonline.com Amazon offers a number of excellent tools to help enterprises keep their data (Read more click here) and applications safe in the cloud. Last year, Amazon <a class="read-more-link" href="https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/">Amazon Macie automates cloud data protection with machine learning</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; csoonline.com</p>
<p>Amazon offers a number of excellent tools to help enterprises keep their data (<a href="http://www.csoonline.com/article/3217029/cloud-security/amazon-macie-automates-cloud-data-protection-with-machine-learning.html"><strong>Read more click here</strong></a>) and applications safe in the cloud. Last year, Amazon unveiled Amazon Inspector, its host-based application vulnerability assessment tool to monitor what is installed and configured on each virtual Instance. This year, it’s Amazon Macie, a security service designed to automatically discover and protect sensitive data stored in AWS.</p>
<p>As organizations move more of their data to Amazon’s various cloud offerings, security teams have the unenviable task of continuously tracking the data to identify, classify and protect sensitive pieces of information such as personally identifiable information (PII), personal health information (PHI), regulatory documents, API keys, secret key material and intellectual property.</p>
<p>Amazon Macie automates what has traditionally been a labor-intensive task by using machine learning to understand where sensitive information is stored and how it is accessed. Macie dynamically analyzes all attempts to access data and flags anomalies, such as large amounts of data being downloaded, uncommon login patterns, or data showing up in an unexpected location. Macie can alert when someone accidentally makes sensitive data externally accessible or stored credentials insecurely.</p>
<p>“Amazon Macie is a service powered by machine learning that can automatically discover and classify your data stored in Amazon S3. But Macie doesn’t stop there, once your data has been classified by Macie, it assigns each data item a business value, and then continuously monitors the data in order to detect any suspicious activity based upon access patterns,” Tara Walker, AWS tech evangelist, wrote on the Amazon Web Services blog.</p>
<aside class="nativo-promo smartphone"></aside>
<p>Currently only available for S3 customers, Macie support for other AWS data stores will come later in the year.</p>
<h3 class="body">Understanding Macie</h3>
<p>Amazon Macie applies predictive analytics algorithms on authentication data such as location, times of access and historical patterns to develop a baseline for how each piece of data is used. To use Macie, administrators have to enable appropriate IAM (identity and access management) roles created for the service. Amazon has created sample templates for cloud formation to set up the necessary IAM roles and policies.</p>
<p>Instead of continuously scanning S3 buckets to find new data which needs to be classified, Macie uses event data from AWS CloudTrail to check for all PUT requests into S3 buckets. This way data is classified automatically as they are added into the buckets. Macie uses the file metadata, file contents and what it has learned about similar files in the past to properly classify the data. It doesn&#8217;t rely on patterns to just recognize known data, such as PII, but can also look at things like source code. After classifying the data, Macie assign a risk level between 1 and 10, with 10 being the highest risk and 1 being the lowest data risk.</p>
<p>“Since we started using Amazon Macie, we’ve found that it is flexible enough to solve a range challenges that would have previously required us to write custom code or build internal tools, such as securing PII and alerting us to access anomalies, helping us move fast with confidence,” says Patrick Kelley, senior cloud security engineer at Netflix. The video streaming service is no stranger to building custom tools when necessary.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Macie can also be integrated with AWS CloudWatch Events and Lambda. For example, organizations have to comply with the European Union’s strict privacy regulation&#8211;The General Protection Data Regulation (GDPR)&#8211;by May 2018. As Amazon Macie recognizes personally identifiable information (PII), organizations can use the Macie dashboard to show compliance with GDPR regulations around encryption and pseudonymization of data. Macie can be combined with Lambda queries to remediate GDPR issues.</p>
<h3 class="body">Catching up on security</h3>
<p>Despite dominating the cloud services market, Amazon has lagged behind Microsoft and Google in security. Amazon Web Services provides a comprehensive set of security tools, but they are effective only if the administrators actually take advantage of them to secure their instances. In contrast, Microsoft has integrated management tools in its Azure platform and Google offers many security offerings by default in Google Cloud Platform. Amazon’s latest moves help close some of the gap.</p>
<p>Turning on AWS CloudTrail, a governance, compliance and auditing service for AWS accounts, by default is a particularly welcome change. CloudTrail provides visibility in everything that happens under the account, and is extremely helpful for understanding what changes were made, by whom, and when. The problem was that too many administrators found out too late that CloudTrail was not turned on; it doesn&#8217;t collect data if not enabled at the time the instance is created. With the change, all customers by default now get visibility into the last seven days of account activity without having to configure the service.</p>
<p>Amazon is adding rules to its AWS Config Service to evaluate AWS configurations to help secure S3 buckets. Considering the number of data exposures this year alone which arose because the S3 buckets were not configured correctly, these rules would help identify buckets that allow global read/write access before they become problems.</p>
<p>Amazon Elastic File system now offers encryption of data while at rest. Amazon also did a complete rewrite of CloudHSM (Hardware Security Module) so that provisioning, patching, high availability and backups are now built into the managed service. FIPS 142-2 Level 3 support is included, along with security mechanisms designed to detect and respond to physical attempts to access or modify the HSM.</p>
<p>The post <a href="https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/">Amazon Macie automates cloud data protection with machine learning</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/amazon-macie-automates-cloud-data-protection-with-machine-learning/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
