article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Different industries and regions have specific regulatory requirements, such as the General Data Protection Regulation (GDPR) for data protection in the EU, the Health Insurance Portability and Accountability Act (HIPAA) for healthcare information in the US, and the Payment Card Industry Data Security Standard (PCI-DSS) for credit card information.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. Attacks targeting these resources aren’t targeting exposed data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

The way to avoid this is by taking into account the human factor when designing cybersecurity training; this means making training fun and engaging and helping employees understand their roles and responsibilities in cybersecurity.

article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

LW: What obstacles are companies running into with cloud migration? Tamir: The problem is that companies have thousands of applications and systems that they need to migrate to the cloud, including older applications and homegrown applications. This becomes a barrier to cloud migration.

article thumbnail

Microsoft Office 365 Attacks on the Rise

Security Boulevard

It’s not surprising the COVID-19 pandemic that pushed workers home also accelerated cloud migration and digital transformation, but new research from Vectra.ai

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

Related: How credential stuffing fuels account takeovers. In pulling off that milestone hack, Paige Thompson took advantage of CapOne’s lack of focus on cloud security as the banking giant rushed headlong into leveraging Amazon Web Services. Here are the key takeaways: Cloud migration risks.

article thumbnail

Cloud-to-Cloud Migration: How to Detect Security Issues

Spinone

Sometimes users are not even aware that they are uploading files to the cloud or the data risks associated with doing so. Risky behavior such as migration of data from the corporate cloud storage to private cloud storage (personal Google Drive account or Dropbox) is flagged and can be automatically sent as an alert to email and / or Slack.