AST July 2018 Magazine AST July 2018 Magazine Issue 24 | Page 68

Volume 25 data vulnerabilities lie, and that is in-house. There are several factors to consider when addressing U.S. federal government data insecurity – such as budget restraints and is- sues with staffing. Are there any issues that stand out in this report? Yes, there are a couple that standout. The massive adoption of cloud computing does not correlate with implementations of data security tools suited to protect these new environments. Although 78% view data-in-motion and 77% view data-at-rest encryption as the most effec- tive tools for protecting data, only 23% of U.S. July 2018 Edition respondents have implemented encryption in the cloud. Additionally, only 31% claimed cloud comput- ing security was a top spending priority. Why is encryption so important? Is there an effective way to manage encryption? Encryption can be viewed as complex, and the management of encryption keys challenging for organizations dealing with budget and staffing limitations. But, federal government agencies can start by selecting encryption and key management technologies that offer a smart, centralized approach and work across clouds, on-premises 35