article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

My book emphasizes the heightened responsibility of C-suite leaders, considering the increased public, media, and regulator scrutiny. Sure, you need state-of-the-art cybersecurity technology like firewalls, anti-virus software, and intrusion detection systems to keep cybercriminals on the back foot. Will that have to change?

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. Does the company have to make DNS, firewall, or routing changes to make sure data can cleanly get from on-prem systems to the CSP? Sean Gallup/Getty Images). Technical review. Some CSPs have dedicated links.

article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

LW: You’ve been speaking a lot about the cloud-mobile environment; please explain what you’re referring to. Nassar: On a personal level, we use our mobile devices to access just about everything from our email, to our banking, to social media collaboration, to sharing photos with family, it’s all in a cloud-mobile environment.

Mobile 193
article thumbnail

Think of remote access as a business continuity issue

SC Magazine

They weighed the weaknesses of these approaches, from operational issues to end-user experience and poor security against other priorities related to digital transformation and cloud migrations. These machines are vulnerable by design and are designed for use inside the enterprise firewall. As it turned out, that was a bad idea.

article thumbnail

Ready to move to the cloud? Here’s what you need to do when vetting service providers

SC Magazine

Does the company have to make DNS, firewall, or routing changes to make sure data can cleanly get from on-prem systems to the CSP? For example, does the customer provide a firewall or does provider? Does the customer take care of reviewing logs and firewall rules and the provider take care of OS?”

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. One might look at Capital One as an indication of just poor hygiene or issues with how they configured their web application firewalls or their S3 buckets.