This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast ( subscribe ). How to Solve the Mystery of Cloud Defense inDepth? Use Cloud Securely?
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Use Cloud Securely?
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloudblog [and now our Cloud Security Podcast too!] Here is my second.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloudblog [and now our Cloud Security Podcast too!]. CloudMigration Security Woes”. “Is
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?”
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast ( subscribe ). How to Solve the Mystery of Cloud Defense inDepth? Use Cloud Securely?
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Two-thirds of the global population will be protected by privacy regulations by 2023, and 70% of organizations say such regulations make cloudmigrations and analytics more difficult. You almost certainly need a chief information security officer (CISO). Outmoded cyber solutions. Assign roles and responsibilities.
“At this year’s Conference 46 percent of all keynote speakers were women,” according to Sandra Toms, VP and curator, RSA Conference, in a blog she posted on the last day of this year’s event. Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017.
This is going to be a bit vague and incomplete, because, hey, this is a personal blog and all that… Naturally, secure defaults. Making security controls dramatically easier to deploy — this applies to both cloud service providers and third party security vendors. Related blogs: “Use Cloud Securely?
In a move that could bring some relief to organizations looking to secure their cloudmigrations, Amazon Web Services on Friday announced that it had acquired Wickr, provider of secure end-to-end encryption and communications platform.
Nabil Hannan Field CISO “We’re still facing a deficit of cybersecurity professionals globally. Karl Fosaaen VP of Research “Across industries, even with workloads shifting to the cloud, organizations suffer from technical debt and improper IT team training – causing poorly implemented and architected cloudmigration strategies.
This is going to be a bit vague and incomplete, because, hey, this is a personal blog and all that… Naturally, secure defaults. Making security controls dramatically easier to deploy — this applies to both cloud service providers and third party security vendors. Related blogs: “Use Cloud Securely?
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). Is Your Fate In the Cloud?”
Popular Episodes by Topic was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). CloudMigration Security Woes”.
Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. This covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast too ( subscribe ). CloudMigration Security Woes”.
“EP56 Rebuilding vs Forklifting and How to Secure a Data Warehouse in the Cloud”. Cloudmigration (top 5). Preparing for CloudMigrations from a CISO Perspective, Part 1”. EP33 CloudMigrations: Security Perspectives from The Field”. More CloudMigration Security Lessons”.
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloudblog , and our Cloud Security Podcast ( subscribe ). CloudMigration SecurityWoes Move to Cloud: A Chance to Finally Transform Security?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content