article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Organizations had to re-examine the traditional business perimeter and migrate to cloud-based tools to support distributed workforces. They had to re-examine the traditional business perimeter and migrate to cloud-based tools to support distributed workforces. Which is the impact?

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

Companies transitioning to the cloud have to think of cybersecurity as more than firewalls, access controls and incident response, and define goals of security that go beyond confidentiality, integrity and availability, said Randy Vickers, chief information security officer for the U.S. House of Representatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Normalyze extends its DSPM platform to hybrid cloud and on-prem environments

The Last Watchdog

With Normalyze, companies that operate hybrid cloud environments can now manage their data security posture from a single platform for a complete understanding of their data attack surface.

article thumbnail

Cybersecurity Collaborative’s Cloud Security Task Force to provide guidance for digital transformation

SC Magazine

The Cybersecurity Collaborative launched a Cloud Security Task Force with the mission of helping organizations guide their migrations and secure ongoing digital transformation initiatives. Cloud security is a more than a hot topic, it’s an imperative,” said Collaborative Executive Director Parham Eftekhari.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

Two-thirds of the global population will be protected by privacy regulations by 2023, and 70% of organizations say such regulations make cloud migrations and analytics more difficult. You almost certainly need a chief information security officer (CISO). Outmoded cyber solutions. Assign roles and responsibilities.

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

The 47-page report provided significant detail to support the conclusion that “According to agency inspectors general, the average grade of the agencies’ overall information security maturity is C-.”. The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise.

CISO 115
article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

As cloud migration has ramped up, it has become typical for enterprises to have dozens to hundreds of cloud accounts, thousands of cloud data stores and tens of thousands of people and non-people identities under their purview. It was more like incredibly complex, nuanced changes seeped in.”. Visualizing dependencies.

Risk 214