Remove 2021 Remove Blog Remove Cloud Migration Remove Risk
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!]. Cloud Migration Security Woes”. “Is

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. Changes in 2022 and Beyond in Cloud Security” (2022 season opener!) “EP8

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Security Boulevard

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. Changes in 2022 and Beyond in Cloud Security” (2022 season opener!) “EP8

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

The Thales Access Management Index 2021 report illustrates a highly fragmented landscape at the enterprise level. Coordinating that many systems can, at a minimum, create operational complexity, but it can also increase the risk of errors or misconfigurations creating security gaps. Protect cryptographic keys. UTM Medium. UTM Source.

article thumbnail

Are You the Keymaster?

CyberSecurity Insiders

Fast-forward to the real world in 2021, and while we have not seen ghosts overrun our cities, what we have seen is a rapid proliferation of bad actors trying to besiege the defenses of virtual machines (VMs) that perform critical functions across modern computing infrastructures. Lose the keys – lose the data. Added Root of trust.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Yet all too many companies and individual employees till lack a full appreciation of the significant risks they, and their organizations, face online. Riccardi: SMBs face challenges when dealing with cybersecurity implications of software-enabled, cloud-based operations due to financial and skill limitations.

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Tue, 06/01/2021 - 06:55. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. My thanks go to my colleague Welland Chu for his valuable input into this blog. Cloud security.

IoT 71