article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing.

article thumbnail

Cloud Migration Security Woes

Anton on Security

I use this label to describe a case when an organization wants to keep every single security technology that they use on-premise after they move to the public cloud. The list can be very long and tedious; it may include such staples as firewalls, anti-malware, SIEM, EDR , NIDS, and even network forensics and NDR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

The Last Watchdog

So we don’t break anything or leave too many things open, like a firewall might do.” Disrupting firewalls Gurvich makes no bones about the fact that Guardicore has set out to disrupt a portion of the $9 billion firewall market. This is completely contradictory to the reasons companies are moving to the cloud,” he says.

Firewall 149
article thumbnail

RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks

The Last Watchdog

We discussed why filtering web and mobile app traffic remains as critical as ever, even as cloud migration intensifies; for a full drill down, please give the accompanying podcast a listen. This upgrade, he told me, is expressly aimed at helping companies optimize secure performance of their hybrid cloud environments.

Mobile 214
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. Does the company have to make DNS, firewall, or routing changes to make sure data can cleanly get from on-prem systems to the CSP? Sean Gallup/Getty Images). Technical review. Some CSPs have dedicated links.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

Most business applications, especially Microsoft Exchange were on-premise deployments that required a company either opening up access to the whole internet or requiring a VPN connection to the company’s perimeter firewall or dedicated VPN concentrator. LW: What about SMBs; how does a traditional VPN service fit as cloud migration deepens?

VPN 213
article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

I recently had the chance to sit down with Kevin Simzer, chief operating officer of Trend Micro, to discuss two of them: Cloud Workload Protection Platform ( CWPP ) and Cloud Security Posture Management ( CSPM.) Here are the key takeaways: Cloud migration risks. Protecting workloads.