CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

The Unique Challenges of Companies Born in the Cloud

admin by admin
April 5, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


There are stark differences between how to manage security policies for on-premises network environments and those that are 100% cloud-based. But many companies continue to struggle with those differences and have experienced plenty of pain as a result.

It’s a challenge Rich Mogull has spent years trying to help companies navigate.

Mogull, CISO at Firemon, recently appeared on Paul’s Security Weekly to discuss what cloud-based organizations need to consider if they are eying SASE and SD-WAN to expand network access for their users. The segment is sponsored by FireMon, whose compliance management tools create a proactive compliance posture that keeps ahead of violations instead of chasing after them.

Mogull discussed what he sees as the “democratization” of security:

“What used to be naturally centralized and gate kept has become a lot more distributed in the cloud,” Mogull said, adding that in today’s cloud environments, there is no more gatekeeping from the data center. The challenge is how to deal with privilege management, how to make sure one can engage with security teams across a vast array of siloes.

Watch the full episode to hear Mogull’s advice on how to navigate this strange, still-new world.

Beyond this Security Weekly discussion, Mogull has written a copious body of guidance for cloud security practitioners. In one such article, he offered the following recommendations for organizations struggling to keep security on the rails amid the massive shifts brought on by the pandemic:

  • Start by fixing cloud governance.
  • Speaking of governance, this is a great time to adopt the concept of the “security champion.”
  • Improve your cloud security visibility.
  • If you aren’t using multiple accounts to manage the blast radius of attacks, start now.
  • Level up your cloud-native incident response.
  • Perform a top to bottom review of your IAM/RBAC implementation and tighten it up.

Click the link and read the full explanation for each bullet point.

Visit https://securityweekly.com/firemon to learn more about Firemon, and visit https://www.securityweekly.com/psw for all the latest episodes of Paul’s Security Weekly.



Source link

Previous Post

Authorities Fully Behead Hydra Dark Marketplace

Next Post

Best practices: Securing your Amazon Location Service resources

Related Posts

Information Security

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

by admin
May 25, 2022
Information Security

Fronton IOT Botnet Packs Disinformation Punch

by admin
May 24, 2022
Information Security

Spring 2022 SOC 2 Type I Privacy report now available

by admin
May 24, 2022
Information Security

Tips to defeat social engineering attacks

by admin
May 24, 2022
Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Next Post

Best practices: Securing your Amazon Location Service resources

Leave Comment

Recommended

New inquiry looks at the state of UK chips

May 25, 2022

Building a pathway to commercial quantum computing

May 25, 2022

KAC: Creating smarter airports that safeguard passenger journeys

May 25, 2022

Intro to ITOM & How it Impacts Cost Optimization

May 25, 2022

The Best of SWL 2022 (SupportWorld Live)

May 25, 2022

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

May 25, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.