CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Preventing Criminals from Using Cloud Applications to Inject Chaos Into Work Environments

admin by admin
April 14, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


In 2020, cyber criminals used cloud applications, the cover of a pandemic, and a newly embraced work-from-home culture to serve up ransomware, steal data, and disrupt how companies do business. The year is over, but the challenges and risks remain.  How do we prevent these criminals from injecting chaos into our hybrid work environments?

As I’ve been preaching for years, the new security paradigm has shifted to focus on applications, users, and data.  Although the network and endpoint still play an important role in security, the shift to secure user access to applications and data has accelerated, especially in a work from anywhere environment.  But where should organizations start?

Doni Brass, Product Management Lead at Cisco Umbrella, joined Enterprise Security Weekly to we lay out how companies and their IT teams can stave off threats in the cloud app discovery process, stop data from landing in the wrong hands, and identify and block cloud malware that can cost both time and treasure!

During the interview, Doni explains the evolution of Cisco Umbrella from OpenDNS to developing a Secure Web Gateway with Firewall and Cloud Access Security Broker (CASB) capabilities to evolving into a Secure Access Service Edge (SASE).  Doni then describes how Cisco Umbrella can protect against various attacks, including:

  • Controlling access to cloud applications, while balancing productivity and security
  • Preventing data leakage leveraging traditional CASB capabilities
  • Limiting OAuth permissions to access data through third party applications

Cisco Umbrella offers flexible, cloud-delivered security when and how you need it. It combines multiple security functions into one solution, so you can extend protection to devices, remote users, and distributed locations anywhere by providing:

  • Intelligence to uncover current and emerging threats
  • Visibility across all devices, ports, and cloud services, anywhere
  • Prevention of phishing, malware, and ransomware attacks

To learn how to prevent criminals from using cloud applications to inject chaos into your work environment, watch the interview on Enterprise Security Weekly here, register for their upcoming webcast here,  or visit securityweekly.com/ciscoumbrella for more information.



Source link

Previous Post

Streamlining evidence collection with AWS Audit Manager

Next Post

Feds: APTs Have Tools That Can Take Over Critical Infrastructure

Related Posts

Information Security

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

by admin
May 25, 2022
Information Security

Fronton IOT Botnet Packs Disinformation Punch

by admin
May 24, 2022
Information Security

Spring 2022 SOC 2 Type I Privacy report now available

by admin
May 24, 2022
Information Security

Tips to defeat social engineering attacks

by admin
May 24, 2022
Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Next Post

Feds: APTs Have Tools That Can Take Over Critical Infrastructure

Leave Comment

Recommended

New inquiry looks at the state of UK chips

May 25, 2022

Building a pathway to commercial quantum computing

May 25, 2022

KAC: Creating smarter airports that safeguard passenger journeys

May 25, 2022

Intro to ITOM & How it Impacts Cost Optimization

May 25, 2022

The Best of SWL 2022 (SupportWorld Live)

May 25, 2022

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

May 25, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.