Remove CISO Remove Cloud Migration Remove Engineering Remove Social Engineering
article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

Yet I reckon that while they play a role in security incidents, they don’t plan an outsized role that cloud misconfigurations do. Similarly, to compromise a modern mobile device, you probably would use social engineering or an exploit, not a configuration weakness. How to Solve the Mystery of Cloud Defense in Depth?”