article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Popular Episodes by Topic This is simply a post that categorizes our podcast episodes by topic and then by download/listen count.

article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Security Boulevard

Data Security in the Cloud“. The Mysteries of Detection Engineering: Revealed! “. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud”. The Mysteries of Detection Engineering: Revealed! “. Cloud migration (top 5).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Nile raises $175 million in series C funding to deliver network-as-a-service (NaaS)

The Last Watchdog

. “Cloud-born edge infrastructure solutions are altering the way we engage with each other and interact with physical spaces in offices, schools, and venues. Patel “Cloud migration strategies for anywhere access to enterprise apps is top of mind for all IT executives, creating a tremendous opportunity for Nile.

Wireless 186
article thumbnail

Anton’s Security Blog Quarterly Q3 2023

Anton on Security

Use Cloud Securely? How CISOs need to adapt their mental models for cloud security” [GCP blog] “How to think about threat detection in the cloud” [GCP blog] “Who Does What In Cloud Threat Detection?” Cloud Migration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?” “Is

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Director/CISO of IT Risk Management. Director/CISO of IT Risk Management at Ulta Beauty located in Bolingbrook, IL. Alexandra holds a B.S. Diane Brown. Ulta Beauty.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”