article thumbnail

Radically simplify and expand Zero Trust to cloud workload

CIO Business Intelligence

Many organizations rely on legacy security architectures to secure their cloud workloads. They often use a combination of: Cloud native security solutions offered by cloud service providers Multiple security tools (firewall, VPN, TLS/SSL inspection, DLP, etc.)

Cloud 89
article thumbnail

Liveblog: Hybrid Architectures, Bridging the Gap to the Cloud

Scott Lowe

This is a liveblog of the AWS re:Invent session titled “Hybrid Architectures: Bridging the Gap to the Cloud” (ARC208). The speaker for the session is Jamie Butler, Manager of Solutions Architecture at AWS (focused on state/local government). Butler says there will be some demos along the way. WorkSpaces (for Windows-based desktops).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative

CTOvision

firewalls, endpoint protection, intrusion detection), but attempts at automating the human interaction part of the process have fallen short. Instead of providing definitive answers to offload our already overburdened teams, system-generated false positives add more work.

Security 150
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on. Definitely not instant access! Don’t use the same password for everything, because if the bad guys crack one, they own you.

Security 249
article thumbnail

How to ensure security in a cloud migration

CIO Business Intelligence

The “aware” are mature and focus on #DevOps and integrated ways to deploy secure capabilities (like programmatically deploying firewall rules in #cloud). Between them and] those who are not is a HUGE gap – not a lot in the middle. @DigitalSecArch Imagine designing an office building without architectural plans.

Cloud 108
article thumbnail

On Network Virtualization and SDN

Scott Lowe

I’ll get to the definition of SDN in just a moment, but first let’s look at the definition of network virtualization. ” These definitions are, in my humble opinion, reasonably precise and accurate. .” ” These definitions are, in my humble opinion, reasonably precise and accurate.

article thumbnail

The Three Tenets of Zero Trust Security

SecureWorld News

Back then, much of the cybersecurity discussion might have been around strengthening passwords, updating anti-virus software, and maybe deploying the latest firewalls to protect the enterprise perimeter. This is the essence of the Zero Trust security architecture, which is gaining popularity in virtually all sectors.