Smart Person's Guide To Digital Transformation & Cloud Security
▼Digital Transformation, Cloud Computing & Cloud Security: iQ1▼
AWS Guide ⬆ How The West Lost To China’s ‘Cloud Hopper’ Hackers ⬆ Images Hyperlinked
Click. Tap.
(READ)
○ ○ ○
In spite of the abundance of data on the issue, CxOs and IT departments keep missing the memo about
the data and cyber risks of Digital Transformation. China's recent success in breaching major Western
organizations is proof. Capital One Financial Corp was fined $80 million for poor cloud migration risk
management. Indeed SSRF exploit in that breach highlighted Public Cloud service risks. Understand
that one can't seriously discuss Cloud Computing, and disregard Cloud Security, Digital Forensics,
and Digital Transformation. Is it possible to embrace cloud risks and win the cloud? Not so fast.
What is cloud computing? To me, it's like OPM (other people's money) or OPR (other people's
resources) in business. The only problem being that on-demand — be it Infrastructure as a
Service (IaaS) hosting, Platform as a Service (PaaS) build/development or SaaS (Software
as a Service) consumer-driven — service is not risk-free. And likely based on a vendor's
pay-as-you-go pricing model. From Office 365 to Adobe Creative Suite, Google Apps,
 
Salesforce or Dropbox to name a few, SaaS is big business, popular and convenient.
Architecturally, cloud services may consist of Private (dedicated), Public (shared)
 
or Hybrid. That is, blended enterprise + public cloud service configuration. The
 
main goal particularly in the case of PaaS & IaaS being cost efficiency, agility
 
in product development, positioning, business competition & hence, ability
 
to focus on core business functions rather than maintenance, IT Admin &
 
in today's Cyber threatscape, Security Admin. This requires competent
and secure (Mobile) Apps delivery, Websites, Data Backup, Recovery,
 
content and compute power delivery together with other business
critical, even national security & other IT resources. This is why
CDNs are vital to cloud computing. And why Windows Azure &
 
Amazon Web Services (AWS) together with all the Financial,
 
CRM systems, and countless vendor services out there, run
the world via the Cloud. But despite the great benefits,
misconfiguration leads to data leaks & cyber attacks.
 
Data Breaches; Weak Identity, Credential & Access
 
Management; Insecure APIs; System & App Vulne
-rabilities; Account Hijacking & Insider Threat;
APTs; Data Loss; Insufficient Due Diligence;
Abuse & Nefarious Use of Cloud Services;
Denial of Service (Attacks); and Shared
Technology Issues are among what we
 
call The Treacherous 12. Essentially
Cloud Computing's top threats. So
whether you are a consumer, or
small business; entrepreneur,
or tech savvy and can build
& run a website+pen test
 
Cyber Resiliency alone,
 
keeps cybercriminals
at bay. CaaS, MaaS,
 
BPaaS, RaaS — all
 
offer risks. Tech
 
Data's video is
 
worthwhile.
D. Hannah
 
FINISHES
 
BELOW
Connect/Consult
Threat Smart XI | High Impact Strategic Business Sense Series (6k)
 
PEACE
TT
F I N I S
Comments
Post a Comment