Tumgik
#And Doug mentioning that if they /don’t/ advertise the cost of the magazine will go above most people’s ability to pay for it
rotzaprachim · 8 months
Text
minx is interesting. It’s interesting and it’s interested in things in a way that I find a lot of current media about feminism not to be. There’s an active interest into poking into some of the uncomfortable areas without simple conclusions when it comes to how feminism should relate to sex and the market/capitalism.
also really appreciate the unapologetic 70’s ness and the use of 70’s events, catchwords, buzz etc in a way that doesn’t always feel tee hee
#Like idk if it always comes to the Conclusions but is really interesting to see a show which is ABOUT feminism and what it actually is#With imperfect people#What does it /mean/ to make something feminist and what does it mean when that thing has to be sold#There’s a couple moments so far that are like well this would blow someone’s mind off#It’s interesting to chew on relative to Daisy jones lol#I’m not going to say it’s anti capitalist but it’s also not that type of subliminal capitalist fantasy show#That just ignores the demands of capitalism to write off a world for the people who’ve already won#Very much almost in Convo with something like the bold type or classic sex and the city for that#Like the whole second episode thing with the ads#the ads unapologetically sucking and being soooo sexist#And upper class country club goer white feminist Joyce /also/ being extremely confined mentally to sexist advertising#Like I hate the edible panties. U know what’s great? Shampoo and makeup#And Doug mentioning that if they /don’t/ advertise the cost of the magazine will go above most people’s ability to pay for it#Like. It’s a show Thinking about a lot of this#I think Joyce is so interesting because she’s both so much more radical and so much more flawed than a lot of the /girlboss/ characters out#There. She’s the rare example of an upper class white feminist that I think the narrative is aware of the class part at least#And she’s flawed and kind of mean and totally out of it#And also like. 5000% more radical than a lot of the the equivalents#Like she isn’t trying to publish Feel Empowered with Sexy Lipstick articles#She’s trying to publish articles about birth control marital rape and abortion access#And her issues often come from where the radicality of her vision is being compromised by praxis#Like that’s so interesting
9 notes · View notes
terabitweb · 5 years
Text
Original Post from SC Magazine Author: Doug Olenick
The scalability, flexibility, easy access, and cost savings of the cloud have made it easier than ever for organizations to store, access, and analyze their customer data. However, regulations like the General Data Protection Regulation (GDPR) place significant demands around how and where data can be accessed and used. Consequently, global organizations that are processing data in the cloud often struggle to achieve data security and regulatory compliance.
In fact, when Google was fined €50 million in France for violating GDPR, much of what the French Data Protection Authority (CNIL) focused on was how the company was processing personal data. Google was not fully disclosing to its Android app customers how their data was being collected and processed for personal advertisements across its services.
Enabling Actionable Data With the Cloud
Cloud data analytics are essential to maintaining a competitive edge; as such, it is incredibly important for data stored in the cloud to be actionable. Actionable data allows organizations to keep internal processes efficient, easily identify customer needs, and tailor their offerings to evolving demands. The problem is that making data accessible and actionable can entail creating vulnerabilities. The traditional ways of securing data, including agents and firewalls, are not effective for securing data that has gone beyond the corporate perimeter. Storing and analyzing data in the cloud is a fundamentally different way of conducting business and requires a fundamentally different approach to cybersecurity. Consequently, many organizations are struggling to store and process data in the cloud while simultaneously maintaining the correct levels of security and regulatory compliance.
The Challenge: Data Sovereignty & Regulations
Data sovereignty laws state that data is subject to the laws of the nation within which it is collected. These laws can create roadblocks for unprepared organizations that are analyzing data in the cloud, a frontier that is designed to make data available anywhere and everywhere. In other words, data regulations such as GDPR, which protect the personal information of citizens of select countries, create headaches for organizations when their users try to store or process regulated data outside of the country of its origin.
Outside of the aforementioned data sovereignty issues, regulations place a number of other demands on organizations, as well. While security goes beyond rules and regulations, they are an important place to start – particularly for those looking to avoid fines.
Why Traditional Security Approaches Don’t Work
As noted previously, the traditional ways of securing data, including agents and firewalls, are rendered insufficient once organizations begin analyzing data in the cloud.
Agents are only effective when they are deployed on all of the devices used by employees and partners to access corporate data. These tools grant comprehensive visibility and control over the devices on which they are installed. While this is fine for corporate assets, employees typically resist such installations on their personal devices for fear of having their personal data and web traffic monitored by their employers. Since 85% of organizations now embrace BYOD, this is not an adequate solution for maintaining data security in modern IT environments.
Firewalls are on-prem tools that are no longer useful for protecting data in cloud environments. It’s impossible to put a firewall around Office 365 or Salesforce, or to use one to secure the highly heterogeneous mix of managed and BYO devices that access data outside of corporate headquarters and around the world.
Encryption (or pseudonymization, as defined by GDPR) helps secure data at rest in cloud applications – particularly when said apps physically store data in foreign nations that are deemed unsafe by regulations’ data sovereignty requirements. Unfortunately, native encryption functionality, such as what is provided by apps like Salesforce, is not truly secure. This is because these apps hold both the encrypted data and the encryption keys. Consequently, everything that a malicious party needs in order to access the decrypted data is stored in the same location. Additionally, this means that native app encryption does not protect data that is physically stored in unsafe locations, leading to noncompliance with regulations like GDPR.
None of these tools are adequate options for securing data processing in the cloud. Organizations that can’t secure cloud apps, personal devices, and all off-premises activity are vulnerable from a security perspective and risk noncompliance with regulations. An alternative to these solutions is to block all access from remote or personal devices and to force all users to leverage a VPN; however, fewer and fewer companies are using this tactic because it impedes user efficiency. 
Achieving Actionability AND Security
Fortunately, there are solutions that allow companies to achieve security and compliance while they leverage their vast stores of data in the cloud. The following capabilities will enable any organization to process cloud data effectively and securely.
Contextual access control can allow and block data access based on a user’s geographic location, job function, device type, and other variables, giving companies highly granular control over their data.
API integrations with enterprise cloud applications allow organizations to detect, manage, and delete sensitive data patterns at rest within the cloud.
As mentioned above, cloud encryption can protect corporate information and satisfy the data sovereignty requirements of regulations like GDPR. However, this is not necessarily the case if the encryption key is stored within the cloud app that houses the encrypted data – as is the case with most apps’ native encryption tools. Fortunately, third-party solutions that provide full-strength cloud encryption protect both structured and unstructured data at rest and allow companies to retain control over their own encryption keys. This type of encryption is the only way to enable secure data processing in the cloud that satisfies data sovereignty demands.
An organization must have full visibility and monitoring capabilities across its entire cloud footprint, which is important from both security and compliance perspectives. This is because even authorized users can represent a threat to data, and because users accessing data outside of a specific region can violate data sovereignty laws. In addition to comprehensive logging and reporting, this entails the use of user and entity behavior analytics (UEBA). This capability can detect suspicious user behavior in real time and enable automated responses such as alerting IT or enforcing step-up multi-factor authentication.
Organizations looking to achieve data security and compliance without restricting their ability to benefit from data-driven insights need to ensure that the proper security processes, policies, and tools are in place. Trying to extend traditional, on-premises solutions and strategies to the cloud is simply not an option. Organizations that attempt this will quickly find themselves outside of compliance with data privacy laws and, in the case of GDPR, facing fines that amount to 4% of their revenue.
While it may appear as though regulatory frameworks are a hindrance for those that are looking to process their data in the cloud, the fact remains that reaching compliance is a solid starting point for protecting data, respecting the individuals whose information is being processed, and demonstrating the qualities of a trustworthy, socially responsible, and forward-thinking organization.
The post Maintaining data security while processing data in the cloud appeared first on SC Media.
#gallery-0-6 { margin: auto; } #gallery-0-6 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-6 img { border: 2px solid #cfcfcf; } #gallery-0-6 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Doug Olenick Maintaining data security while processing data in the cloud Original Post from SC Magazine Author: Doug Olenick The scalability, flexibility, easy access, and cost savings of the cloud have made it easier than ever for organizations to store, access, and analyze their customer data.
0 notes