Remove CISO Remove Cloud Migration Remove Software
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit. Cloud service provider fitness review. Click here for more coverage of the 2021 RSA Conference.

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

How to Solve the Mystery of Cloud Defense inDepth? Does the World Need Cloud Detection and Response(CDR)? Use Cloud Securely? How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection? What Does This EvenMean?! Its a multicloud jungle out there.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

Nassar: On a personal level, we use our mobile devices to access just about everything from our email, to our banking, to social media collaboration, to sharing photos with family, it’s all in a cloud-mobile environment. So if you’re a Microsoft shop, you’re on an Office 365 and a Windows 10 migration path.

Mobile 193
article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. This accelerated the convergence of on-premises and cloud-hosted IT infrastructure. Towards zero-trust So how should CISOs steer their organizations?

CISO 244
article thumbnail

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

The Last Watchdog

Companies have come to depend on Software as a Service – SaaS — like never before. From Office 365 to Zoom to Salesforce.com, cloud-hosted software applications have come to make up the nerve center of daily business activity. Related: Managed security services catch on.

article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

How CISOs Should Respond. The threat of DDoS attacks continues to evolve as a threat that can have grave impacts to business operations as companies migrate more resources to the cloud, migrate workforces to remote and/or hybrid environments, and lean on IoT connectivity to conduct operations,” Bayers said.

DDOS 113
article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. Sonrai is bringing graph database technology to bear on cloud security at a time when the migration from on-premises company data centers to the cloud is in full swing.

Risk 214