article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Riccardi engagingly chronicles how company leaders raced down the path of Internet-centric operations, and then cloud-centric operations, paying far too little attention to unintended data security consequences. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. But they were not at all surprising.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

Other standards to consider are the Center for Internet Security (CIS) Controls and FedRAMP. The post Five considerations for cloud migration, from the House of Representatives CISO appeared first on SC Media. Yes, it’s a federal program, but it’s a good standard to use when evaluating a CSP. Technical review.

article thumbnail

RSAC insights: How the ‘CIEM’ framework is helping companies manage permissions glut

The Last Watchdog

Consider that global spending on cloud infrastructure services jumped 32 percent to nearly $40 billion in the last quarter of 2020. This reflects the rise in remote work and schooling, as well as spikes in online shopping, gaming and media streaming over the past 12 to 18 months. We’re on a good path.

article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

LW: You’ve been speaking a lot about the cloud-mobile environment; please explain what you’re referring to. Nassar: On a personal level, we use our mobile devices to access just about everything from our email, to our banking, to social media collaboration, to sharing photos with family, it’s all in a cloud-mobile environment.

Mobile 193
article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. Mukerji: Cloud is here to stay. Most of our customers, in fact, every single one of our customers, has some sort of cloud initiative in progress.

article thumbnail

Ready to move to the cloud? Here’s what you need to do when vetting service providers

SC Magazine

Other standards to consider are the Center for Internet Security (CIS) Controls, FedRAMP, and the Cloud Security Alliance’s Cloud Controls Matrix (CCM). Graham Holdings’ Halota said for companies moving forward with a cloud migration, start by developing a cloud strategy. The post Ready to move to the cloud?