article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. It’s crucial to understanding the fitness of the CSP to assess future risk. Security risk review. Ensuring clean connectivity will reduce risk so there’s less of a chance for outages.

article thumbnail

Obstacles and Opportunities: The Move to Cloud IAM

Security Boulevard

Many of the early adopters were particularly concerned about security, and tested the waters with non-essential apps that were easy to migrate and presented minimal risk. The study's purpose was to investigate the challenges that are holding organizations back from migrating IAM to the cloud.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

I recently had the chance to sit down with Kevin Simzer, chief operating officer of Trend Micro, to discuss two of them: Cloud Workload Protection Platform ( CWPP ) and Cloud Security Posture Management ( CSPM.) Here are the key takeaways: Cloud migration risks. Posture management provides a baseline,” Simzer says.

article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

I had an enlightening discussion about this with Dana Tamir, vice president of market strategy for Silverfort , a Tel Aviv-based supplier of multi-factor authentication technology. LW: What obstacles are companies running into with cloud migration? This becomes a barrier to cloud migration. We spoke at RSA 2020.

article thumbnail

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

The Last Watchdog

CASBs, a term coined by tech industry consultancy Gartner, first cropped about seven years ago to help organizations enforce security and governance policies as they commenced, in earnest, their march into the cloud. Still, the added complexities of cloud migration translated into fresh tiers of wide-open attack vectors.

Risk 149
article thumbnail

From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data…

Anton on Security

Note that our DLP (called Cloud DLP because we loooove creative product names here) can do a lot of very cool “tricks” related to data transformation , data de-identification and even re-identification risk analysis (due to its privacy origins). Sensitive data discovery has value across the entire migration process.

article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

My Fireside Chat podcasts to come will get into their insights about reducing the risk of access manipulation by continuously and comprehensively monitoring access patterns. The trick in today’s operating environment is how to do this well with cloud migration accelerating.

Mobile 200