Smart Person's Guide To Digital Transformation & Cloud Security

Digital Transformation, Cloud Computing & Cloud Security: iQ1

AWS Guide ⬆ How The West Lost To China’s ‘Cloud Hopper’ Hackers ⬆ Images Hyperlinked

Click. Tap.

(READ)

○ ○ ○

In spite of the abundance of data on the issue, CxOs and IT departments keep missing the memo about

the data and cyber risks of Digital Transformation. China's recent success in breaching major Western

organizations is proof. Capital One Financial Corp was fined $80 million for poor cloud migration risk

management. Indeed SSRF exploit in that breach highlighted Public Cloud service risks. Understand

that one can't seriously discuss Cloud Computing, and disregard Cloud Security, Digital Forensics,

and Digital Transformation. Is it possible to embrace cloud risks and win the cloud? Not so fast.

What is cloud computing? To me, it's like OPM (other people's money) or OPR (other people's

resources) in business. The only problem being that on-demand — be it Infrastructure as a

Service (IaaS) hosting, Platform as a Service (PaaS) build/development or SaaS (Software

as a Service) consumer-driven — service is not risk-free. And likely based on a vendor's

pay-as-you-go pricing model. From Office 365 to Adobe Creative Suite, Google Apps,

Salesforce or Dropbox to name a few, SaaS is big business, popular and convenient.

Architecturally, cloud services may consist of Private (dedicated), Public (shared)

or Hybrid. That is, blended enterprise + public cloud service configuration. The

main goal particularly in the case of PaaS & IaaS being cost efficiency, agility

in product development, positioning, business competition & hence, ability

to focus on core business functions rather than maintenance, IT Admin &

in today's Cyber threatscape, Security Admin. This requires competent

and secure (Mobile) Apps delivery, Websites, Data Backup, Recovery,

content and compute power delivery together with other business

critical, even national security & other IT resources. This is why

CDNs are vital to cloud computing. And why Windows Azure &

Amazon Web Services (AWS) together with all the Financial,

CRM systems, and countless vendor services out there, run

the world via the Cloud. But despite the great benefits,

misconfiguration leads to data leaks & cyber attacks.

Data Breaches; Weak Identity, Credential & Access

Management; Insecure APIs; System & App Vulne

-rabilities; Account Hijacking & Insider Threat;

APTs; Data Loss; Insufficient Due Diligence;

Abuse & Nefarious Use of Cloud Services;

Denial of Service (Attacks); and Shared

Technology Issues are among what we

call The Treacherous 12. Essentially

Cloud Computing's top threats. So

whether you are a consumer, or

small business; entrepreneur,

or tech savvy and can build

& run a website+pen test

Cyber Resiliency alone,

keeps cybercriminals

at bay. CaaS, MaaS,

BPaaS, RaaS — all

offer risks. Tech

Data's video is

worthwhile.

D. Hannah

FINISHES

BELOW

Connect/Consult

Threat Smart XI | High Impact Strategic Business Sense Series (6k)


PEACE

TT

F I N I S

Comments