article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

My book emphasizes the heightened responsibility of C-suite leaders, considering the increased public, media, and regulator scrutiny. And when strong passwords and MFA let you down, encryption can keep sensitive data from being accessed by cybercriminals. Will that have to change?

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. But once inside a network, the humans take over.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AWS acquires encrypted comms platform Wickr to support shift to hybrid work environments

SC Magazine

In a move that could bring some relief to organizations looking to secure their cloud migrations, Amazon Web Services on Friday announced that it had acquired Wickr, provider of secure end-to-end encryption and communications platform. (Photo by David Ryder/Getty Images).

article thumbnail

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Anton on Security

Those who follow me on social media already knows this, but we have launched THE Cloud Security Podcast. How and where the data is encrypted? TL;DR: Find this on Google Podcasts , Apple Podcasts , Spotify , Stitcher and wherever else podcasts can be found. You can also download the episodes directly here.

article thumbnail

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Security Boulevard

Those who follow me on social media already knows this, but we have launched THE Cloud Security Podcast. How and where the data is encrypted? Resources: Confidential computing at Google Cloud. Episode 2 “Data Security in the Cloud” ( episode download link ). Security during cloud migration.

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. But ExtraHop noticed that the tool also opening encrypted connections to vendor-owned cloud storage, a major HIPAA violation. Mukerji: Cloud is here to stay.

article thumbnail

Ready to move to the cloud? Here’s what you need to do when vetting service providers

SC Magazine

When I move to a new cloud vendor I always ask: how can we reduce our footprint? That could be by purging un-needed data, encryption, archiving, anonymizing data, basically doing something different,” Halota said. With the cloud, there are many opportunities that weren’t available to us before.”.