article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. You have to be allowed to exchange data with cloud service providers, with on-prem systems, and with other individuals and organizations, but in a secure way.”.

article thumbnail

In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities

Dark Reading

Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hearing from CISOs at Google Cloud and Beyond

Anton on Security

Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business at Google Cloud. In fact, many “CISO priorities lists” are floating out there online and many people claim to know “what CISOs want.” My analyst years taught me to be skeptical about such claims, if only because there are vast differences between CISOs of different organizations, in terms of security maturity, for example.

CISO 100
article thumbnail

BrandPost: CISOs Are Focused on These 3 Trends, Are You?

CSO Magazine

The rise in remote work means that many organizations are managing a complex web of in-person, online, and hybrid work scenarios while also juggling cloud migration to support their diversified workforce.

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Cloud Security Podcast by Google?—?Popular Data security “Data Security in the Cloud“ “Modern Data Security Approaches: Is Cloud More Secure?” Threat Models and Cloud Security” “EP31 Cloud Certifications, and Cloud Security with TheCertsGuy” “Beyond Compliance: Cloud Security in Europe” “Application Security in the Cloud” Resources: Our video trailer Our new audio trailer Blog with some ideas from the first 46 episodes Cloud Security Podcast by Google?—?Popular

article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

It can be argued that we live in a cloud-mobile business environment. Related: The ‘shared responsibility’ burden Most organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks. And startups today typically launch with cloud-native IT infrastructure. And the first tools many of them grab for daily is a cloud-hosted productivity suite: Office 365 or G Suite. Who’s logging into my cloud apps?

CISO 121
article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Security Boulevard

Cloud Security Podcast by Google?—?Popular Data Security in the Cloud“. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. EP39 From False Positives to Karl Popper: Rationalizing Cloud Threat Detection”. Threat Detection at Google Cloud Security Summit”.

article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

Rapid advances in AI, robotics, machine learning, the cloud and other emerging technologies like edge computing or quantum computing are happening in shorter timeframes and changing the very nature of the jobs and skills that are required.

article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Security Boulevard

Cloud Security Podcast — Two Years Later or Our Year-End Reflections for 2022! We have been running our Cloud Security Podcast by Google for almost 2 years ( TWO YEARS! ) We explored a few new areas of cloud security. Cloud Detection and Response?”.

article thumbnail

Anton’s Security Blog Quarterly Q4 2022

Anton on Security

This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…” Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking” Episode 2 “Data Security in the Cloud” EP47 “Megatrends, Macro-changes, Microservices, Oh My! Changes in 2022 and Beyond in Cloud Security” Episode 3 Automate and/or Die?

article thumbnail

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

The Last Watchdog

From Office 365 to Zoom to Salesforce.com, cloud-hosted software applications have come to make up the nerve center of daily business activity. To accelerate cloud migration, AWS, Microsoft Azure and Google Cloud guaranteed that the hosted IT infrastructure they sought to rent to enterprises would be security-hardened – at least on their end. Thus, the burden was laid squarely on company security teams to harden cloud-connections on their end.

article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

Pity the poor CISO at any enterprise you care to name. As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. At RSA Conference 2022 , which opened today in San Francisco, new security frameworks and advanced, cloud-centric security technologies will be in the spotlight. Related: The rise of ‘XDR’.

article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Anton on Security

It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!] Cloud Migration Security Woes” “Is Your Fate In the Cloud?” FREE BONUS :-) Top Cloud Security Podcast episodes: Episode 4 “Gathering Data for Zero Trust” Episode 1“Confidentially Speaking” Episode 5 “Preparing for Cloud Migrations from a CISO Perspective, Part 1” Enjoy! data-security security-operations cloud-security

article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

How CISOs Should Respond. In response, Bayers said, CISOs need to take the threat of DDoS seriously as part of a defense-in-depth approach to cyber hygiene. “If A series of distributed denial of service ( DDoS ) attacks today briefly took down the websites of over a dozen U.S.

DDOS 73
article thumbnail

Cybersecurity Collaborative’s Cloud Security Task Force to provide guidance for digital transformation

SC Magazine

The Collaborative convened the Cloud Computing Task Force of roughly 15 CISOs in February. The Cybersecurity Collaborative launched a Cloud Security Task Force with the mission of helping organizations guide their migrations and secure ongoing digital transformation initiatives.

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Retail

Further to the topic of governance, FISMA decided to subordinate the CISO to the CIO, which is an organizational design no longer in favor among enterprises throughout the Fortune 500 and Global 2000. The modern CISO is more than “IT security.”

Retail 97
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

It covers both Anton on Security and my posts from Google Cloud blog [and now our Cloud Security Podcast too!]. Data security: “New whitepaper: Designing and deploying a data security strategy with Google Cloud” [GCP Blog]. Transform data to secure it: Use Cloud DLP” [GCP Blog].

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

A lack of understanding of these relationships is a big reason why cloud breaches happen. With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. We discussed why graph databases and graph analytics are so well-suited to advancing cybersecurity – especially as digital transformation accelerates towards, and within, the cloud.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

But the challenges are accumulating on multiple fronts: •Cloud computing. One-half of corporate data is now stored in the cloud. Organizations are equipping workers with cloud-based applications like Microsoft 365 and Google Workspace, and running enterprise workloads on cloud platforms like AWS. Create a data map to show its flow across on-prem data centers, private clouds and public clouds.

article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Anton on Security

Cloud Security Podcast — Two Years Later or Our Year-End Reflections for 2022! We have been running our Cloud Security Podcast by Google for almost 2 years ( TWO YEARS! ) We explored a few new areas of cloud security. Cloud Detection and Response?”

article thumbnail

Anton’s Security Blog Quarterly Q4 2022

Security Boulevard

This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking”. Episode 2 “Data Security in the Cloud”.

article thumbnail

Building confidence in employee identity protection is core to zero trust security

Thales Cloud Protection & Licensing

Accelerated cloud migration and work from anywhere trends have changed the security landscape. Organizations where the CISO has greater ownership of identity and access management have progressed toward fully implementing identity-related security outcomes.

CISO 68
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Women in Cloud and Security – A Panel with McAfee, AWS, and Our Customers. Join McAfee in our Women in Cloud and Security Panel.

article thumbnail

Anton’s Security Blog Quarterly Q3 2022

Anton on Security

This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” Top 5 Cloud Security Podcast by Google episodes: Episode 1“Confidentially Speaking” Episode 47 “Megatrends, Macro-changes, Microservices, Oh My! A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” ”Top 10 SIEM Log Sources in Real Life?”

article thumbnail

AWS acquires encrypted comms platform Wickr to support shift to hybrid work environments

SC Magazine

In a move that could bring some relief to organizations looking to secure their cloud migrations, Amazon Web Services on Friday announced that it had acquired Wickr, provider of secure end-to-end encryption and communications platform.

article thumbnail

The State of Cloud and Cloud Security in 2020

SecureWorld News

Not everyone would describe cloud security as "very exciting," however, the four expert panelists who joined us on our series of SecureWorld Remote Sessions for a Q&A hour all certainly shared this sentiment. Meet the cloud panel. The cloud has lots of opportunities.

article thumbnail

Think of remote access as a business continuity issue

SC Magazine

A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. They often went around the VPN, for example, using convenient but unsanctioned and insecure cloud and web apps instead of corporate-sanctioned and secured applications.

article thumbnail

New Nemertes Study Reveals Benefits of Zero Trust Extend Far Beyond Network Security

CyberSecurity Insiders

The Nemertes study emphasizes three common ZTNA use cases: VPN replacement , which was the most common scenario with 44% of participants reporting they utilize Appgate SDP to modernize secure remote connections; Securing DevOps to provide developers with dynamic access to network resources, and; Cloud migration to unify access policies and controls across all on-premises and cloud-based environments.

article thumbnail

Anton’s Security Blog Quarterly Q3 2022

Security Boulevard

This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next”. Changes in 2022 and Beyond in Cloud Security”.