The Gartner CISO Playbook: Leveraging Effective Control in the Cloud

For as long as we can remember, the concept of control has rested comfortably in physical location and ownership. It’s simple, if you could see something or you knew exactly where it ...

2 Strategies to Tighten Your Cloud Security

Creating a thorough and effective security program is difficult enough when your data is stored on-premises. But most organizations and agencies straddle hybridized on-prem and cloud environments—or they’re cloud-native entirely. This complicates ...
Joe Goldberg

CASB, what is it? Why do I need it? What has it done for me lately?

The first question most people have when they hear the acronym CASB is, “What the heck is this CASB thing?” According to Gartner, a cloud access security broker (CASB) is an on-premises ...

Blockchain Needed as Cybercrime Goes Corporate

The early days of cybercrime were a simpler time. What was once largely the domain of individuals — with agendas running the spectrum from curiosity, to mischief, to anarchy, to crime — ...
How to Prepare Your AWS Environment in Advance of a Cyber Security Incident

How to Prepare Your AWS Environment in Advance of a Cyber Security Incident

| | Cloud Security
The post How to Prepare Your AWS Environment in Advance of a Cyber Security Incident appeared first on Delta Risk ...
50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts

50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts

With revenue from the cloud computing sector expected to hit $411 billion by 2020, it’s no wonder that more and more companies are shifting their services to the cloud where flexibility and ...

Application Development GDPR Compliance Guidance

Last week IBM developerWorks released a three-part guidance series I have written to help Application Developers develop GDPR compliant applications. Developing GDPR Compliant Applications GuidancePart 1: A Developer's Guide to the GDPRPart ...
The Hybrid Cloud Habit You Need to Break

The Hybrid Cloud Habit You Need to Break

A little while ago, security professionals from my firm watched as hackers began probing the network of a large financial institution. The hackers took their time, poking here, prodding there, until they ...

Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

A few years ago, companies were reluctant to adopt cloud computing because they thought a lack of physical access to the network would deprive them of control over their data. A major ...

Security Must Adjust as SDN Goes Mainstream

After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on ...
Loading...