Remove 2021 Remove Cloud Migration Remove Risk
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“You have to be allowed to exchange data with cloud service providers, with on-prem systems, and with other individuals and organizations, but in a secure way.”. Click here for more coverage of the 2021 RSA Conference. During his talk, Vickers outlined five considerations for security teams as they migrate to the cloud.

article thumbnail

Top Microsegmentation Software for 2021

eSecurity Planet

Therefore, each organization needs to determine the level of granularity that is right for a specific environment according to the risk profile of applications. Identify and track workloads that are most at risk with intelligent scoring and flagging of vulnerability and exposure data. ShieldX Differentiators.

Software 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

Here are AI our episodes aired in 2023 (we had AI episodes before , but only 3 of them): EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw EP146 AI Security: Solving the Problems of the AI Era: A VC’s Insights EP144 LLMs: A Double-Edged Sword for Cloud Security? 2021) We Are Almost 3!

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. What this allows decision makers to do is visualize risk,” Kedrosky says. And graph analytics allows them to map out their risk.”. Visualizing dependencies.

Risk 214
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

Cloud security: “Move to Cloud: A Chance to Finally Transform Security?”. Cloud Migration Security Woes”. “Is Is Your Fate In the Cloud?”. FREE BONUS :-) Top Cloud Security Podcast episodes: Episode 4 “Gathering Data for Zero Trust”. Episode 5 “Preparing for Cloud Migrations from a CISO Perspective, Part 1”.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

As just one measure, the number of data breaches in the first nine months of 2021 exceeded all those in 2020, a new record. Evolving privacy regulations like the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) mean ongoing headaches for cybersecurity, compliance and risk management teams.

article thumbnail

Authentication and access management increasingly perceived as core to Zero Trust Security

Thales Cloud Protection & Licensing

Tue, 09/14/2021 - 05:52. The acceleration of cloud migration and the proliferation of containers, microservices and IoT devices have placed identity in the center of corporate security, making identity and access management (IAM) as important as never before. Nevertheless, internal threats also pose a big risk.