article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

It’s crucial to understanding the fitness of the CSP to assess future risk. Security risk review. The General Services Administration has developed the Federal Risk and Management program to help manage the NIST controls. Other standards to consider are the Center for Internet Security (CIS) Controls and FedRAMP.

article thumbnail

RSAC Fireside Chat: Dealing with the return of computing workloads to on-premises datacenters

The Last Watchdog

A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms Many companies, indeed, are shifting to cloud-hosted IT infrastructure, and beyond that, to containerization and serverless architectures. I’ll keep watch and keep reporting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are constantly connecting to each other across the Internet. LW: What obstacles are companies running into with cloud migration? This becomes a barrier to cloud migration.

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

I recently had the chance to sit down with Kevin Simzer, chief operating officer of Trend Micro, to discuss two of them: Cloud Workload Protection Platform ( CWPP ) and Cloud Security Posture Management ( CSPM.) Here are the key takeaways: Cloud migration risks. I’ll keep watch and keep reporting.

article thumbnail

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

The Last Watchdog

CASBs, a term coined by tech industry consultancy Gartner, first cropped about seven years ago to help organizations enforce security and governance policies as they commenced, in earnest, their march into the cloud. Still, the added complexities of cloud migration translated into fresh tiers of wide-open attack vectors.

Risk 200
article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

Some CISOs, at first, were reserved and said, ‘We’re not moving to the cloud.’ They don’t necessarily think that this is part of a cloud migration, until they start using AWS and Azure and moving their workforce fully into the cloud. What are they touching on a cloud app? Are they being risky?

Mobile 193
article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

My Fireside Chat podcasts to come will get into their insights about reducing the risk of access manipulation by continuously and comprehensively monitoring access patterns. The trick in today’s operating environment is how to do this well with cloud migration accelerating. Two impromptu meetings I had touched on this.

Mobile 238