AST July 2018 Magazine AST July 2018 Magazine Issue 24 | Page 68
Volume 25
data vulnerabilities lie, and that is in-house.
There are several factors to consider when
addressing U.S. federal government data
insecurity – such as budget restraints and is-
sues with staffing. Are there any issues that
stand out in this report?
Yes, there are a couple that standout.
The massive adoption of cloud computing
does not correlate with implementations of
data security tools suited to protect these new
environments.
Although 78% view data-in-motion and 77%
view data-at-rest encryption as the most effec-
tive tools for protecting data, only 23% of U.S.
July 2018 Edition
respondents have implemented encryption in
the cloud.
Additionally, only 31% claimed cloud comput-
ing security was a top spending priority.
Why is encryption so important? Is there an
effective way to manage encryption?
Encryption can be viewed as complex, and the
management of encryption keys challenging
for organizations dealing with budget and
staffing limitations.
But, federal government agencies can start
by selecting encryption and key management
technologies that offer a smart, centralized
approach and work across clouds, on-premises
35