Remove Cloud Migration Remove Digital transformation Remove Information Security
article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre. Her specialties are in news, thought leadership, features, white papers, and PR writing, and she is an experienced editor for both print and online publications.

article thumbnail

Cybersecurity Collaborative’s Cloud Security Task Force to provide guidance for digital transformation

SC Magazine

The Cybersecurity Collaborative launched a Cloud Security Task Force with the mission of helping organizations guide their migrations and secure ongoing digital transformation initiatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

Based in New York City, Sonrai launched in late 2017 to help companies gain clarity about data and identity security-related relationships within their public cloud envrionments, including Amazon Web Services, Microsoft Azure, Google Cloud. It was more like incredibly complex, nuanced changes seeped in.”.

Risk 214
article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

The 47-page report provided significant detail to support the conclusion that “According to agency inspectors general, the average grade of the agencies’ overall information security maturity is C-.”. The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise.

CISO 116
article thumbnail

The Difference Between Human and Machine Identities

Security Affairs

As digital transformation is advancing and automation is becoming an essential component of modern enterprises, collaboration between humans and machines is crucial. Along with this comes the need for secure communication as machines operate increasingly on behalf of humans.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Please join McAfee, AWS, and our customers to discuss the impact women are having on information security in the cloud. These remarkable women represent multiple roles in cloud and security, from technical leadership through executive management. Chief Information Security Officer. Can’t make it?

article thumbnail

Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLP

McAfee

Organizations have been in the midst of digital transformation projects for years, but this development represented a massive test. Not only is it impractical, but it undermines the consolidation, simplification, and cost reduction promised both by digital transformation and the SASE framework.