January 12, 2018

What every security professional should consider when it comes to fortifying cloud security.

 In my last article, I introduced the lesser known parts of cloud security, the ones that no one is talking about. These serve as the key foundation upon which an entire IT operation is built upon, and yet, they are likely to be overlooked. Previously, we shed light on three crucial parts of the security chain protecting the cloud. These were the device, the user, and the network used to connect them to the server. In Part II we’ll talk about the delicate balances between user experience and security, and collaboration and security, as well as the best practices for today’s ITSEC team.
 
To read the first 3 secrets as they were published on CSO Online, click here.
 
SHARE THIS ARTICLE