article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“You have to be allowed to exchange data with cloud service providers, with on-prem systems, and with other individuals and organizations, but in a secure way.”. Click here for more coverage of the 2021 RSA Conference. During his talk, Vickers outlined five considerations for security teams as they migrate to the cloud.

article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Security Boulevard

Some stuff that is coming in Q1 2023 includes episodes on BeyondProd, our security guardrail magic, security architecture (with more cloud migration challenges!) More “CISO meets cloud” episodes are planned as well! Cloud security for CISOs. Security during cloud migration. because Mandiant!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Resilience is the New Digital Transformation KPI

Security Boulevard

Wed, 04/14/2021 - 08:58. Apr 14, 2021. Digital resilience was a major theme at IDC Directions 2021 in March. Replatform complex, multigenerational systems to modern architectures, such as private and public cloud. . Digital resilience spending will continue to accelerate in 2021 as the global economy improves. .

article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Anton on Security

Some stuff that is coming in Q1 2023 includes episodes on BeyondProd, our security guardrail magic, security architecture (with more cloud migration challenges!) More “CISO meets cloud” episodes are planned as well! Perhaps a live video of our recording session — that will be fun! because Mandiant! Fun guests to invite?

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Tue, 06/01/2021 - 06:55. The gaming operator in Asia partnered with Thales to deploy CipherTrust Data Security Platform , which simplifies protection of sensitive data through anonymization to accelerate regulatory compliance and secure cloud migration. Cloud security. Use cases of secure IoT deployment.

IoT 71
article thumbnail

Ready to move to the cloud? Here’s what you need to do when vetting service providers

SC Magazine

And with more people working remotely during the pandemic, there’s been a push to the cloud, which has forced them to rethink their basic networking and security architectures. So what should security teams prioritize when they decide to make that move and start considering new cloud providers?

article thumbnail

Top Microsegmentation Software for 2021

eSecurity Planet

The basic idea is to segment off parts of the network, especially the most sensitive parts, and wall them off with stricter policies and tie them into a zero-trust architecture. DxO enables secure, dynamic end-to-end data tunnels between edge devices, the data center, and cloud for and between Windows and Linux. DH2i Differentiators.

Software 130