A "zero trust" framework can help organizations better define their access control strategies and ramp up authentication, says Vishal Salvi, global CISO and head of cybersecurity at Infosys Ltd., a multinational outsourcing company.
Customers are turning to the cloud to reduce capital expenses and increase agility
as part of their digital innovation (DI) initiatives. Despite the benefits, cloud migration
results in business-critical data and services being scattered across clouds and data
centers. This leads to an expanded attack surface and a...
With the massive shift to telework as a result of the COVID-19 pandemic, shadow IT is becoming a more critical security issue around the world. Security experts offer tips on mitigating the risks involved.
The world of ephemeral computing using the cloud, containers, and Kubernetes continues to evolve in ways that are both innovative and challenging. Change happens so fast it's hard for Security and GRC professionals to keep up. Organizations need to take a holistic approach to Kubernetes security and consider both the...
This webinar provides attendees with an overview of machine learning services and examples of outcomes from the AWS, Google and Microsoft Azure clouds. It will address challenges and opportunities in gleaning insights from large data sets. Presenters will also share what ClearDATA is doing to help organizations make...
City of Gold Coast (CoGC) remains the second largest local government in Australia, based on the Gold Coast's resident population. With 3,900 staffers, CoGC provides a range of services, activities and facilities for residents and visitors including employment opportunities, events, libraries, city management, water...
The public cloud has reimagined the way business is done, embracing change, iterating and learning.
Thus, cyber attacks are focused on the public cloud because the pickings are easy: misconfigured cloud resources unwittingly expose billions of records to prying eyes. Automation has changed the game for hackers,...
Public cloud users are confused as to who owns their cloud security, when the reality is that cloud users must protect their data.
Download this infographic for an overview of the top challenges organizations face with cloud security.
Enterprises are accelerating their move to the public cloud, and expanding their use of multiple cloud services.
However, while the momentum around cloud migrations and cloud-native development continues to pick up steam, many operations teams lack the capabilities they need to efficiently and proactively manage...
Transformation has created a need for a better approach to remote access. VPNs backhaul traffic through a datacenter just to access apps running in cloud. This means a poor user experience and an increase in MPLS costs. This is why Gartner recommends that enterprises adopt a zero trust network access (ZTNA) service...
VMware is acquiring cloud security firm Carbon Black in a $2.1 billion cash deal to bolster the virtualization giant's security portfolio. It's also acquiring Pivotal, a company that focuses on helping its customers build applications in the cloud as well as through new technologies such as containers.
The transition to cloud-based software and infrastructure has revolutionized development and services. It's also created a bevy of new security challenges. Jay Heiser of Gartner says if organizations don't get cloud security right, it's their own fault. Here's why.
Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the...
Like many risk-averse organizations, state and local governments are missing out on the benefits of full-scale cloud adoption because they are paralyzed by the complexities associated with trusting their data to a third party. It's no surprise that government agencies have concerns about storing citizen data in the...
More organizations are deploying single sign-on mechanisms when they move to software-as-a-service applications to help enhance authentication and control access, says Moshe Ferber, chairman of the Israeli chapter of the Cloud Security Alliance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.