article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Yet all too many companies and individual employees till lack a full appreciation of the significant risks they, and their organizations, face online. My book emphasizes the heightened responsibility of C-suite leaders, considering the increased public, media, and regulator scrutiny. Will that have to change?

article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

It’s crucial to understanding the fitness of the CSP to assess future risk. Security risk review. The General Services Administration has developed the Federal Risk and Management program to help manage the NIST controls. Ensuring clean connectivity will reduce risk so there’s less of a chance for outages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco wins SC Media Award for “Best Security Company”

Cisco Security

SC Media has named Cisco the “Best Security Company” as part of its 2021 SC Awards. I want to thank SC Media and their large panel of esteemed industry expert judges for this award. It’s this innovative approach that has helped Cisco Secure gain recognition from SC Media, one of the industry’s most respected media outlets.

Media 138
article thumbnail

News Alert: Normalyze extends its DSPM platform to hybrid cloud and on-prem environments

The Last Watchdog

With Normalyze, companies that operate hybrid cloud environments can now manage their data security posture from a single platform for a complete understanding of their data attack surface. Organizations with sophisticated hybrid cloud frameworks struggle to get an end-to-end picture of the risks across all data stores.

article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

LW: You’ve been speaking a lot about the cloud-mobile environment; please explain what you’re referring to. Nassar: On a personal level, we use our mobile devices to access just about everything from our email, to our banking, to social media collaboration, to sharing photos with family, it’s all in a cloud-mobile environment.

Mobile 193
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Research from Cybersecurity Ventures, which first appeared in the media early last year, predicts that women will represent more than 20 percent of the global cybersecurity workforce by the end of 2019. During her first few years at Booz Allen, she supported technology, innovation and risk analysis initiatives across U.S. Diane Brown.

article thumbnail

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Anton on Security

Those who follow me on social media already knows this, but we have launched THE Cloud Security Podcast. What risks are mitigated by confidential computing? TL;DR: Find this on Google Podcasts , Apple Podcasts , Spotify , Stitcher and wherever else podcasts can be found. You can also download the episodes directly here.