Cargando…
Securing the Cloud: the lurking threats behind the scenes
<!--HTML--><p>Cloud services are being widely adopted at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p> <u...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2018
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2648577 |
_version_ | 1780960688918757376 |
---|---|
author | Simic, Darko |
author_facet | Simic, Darko |
author_sort | Simic, Darko |
collection | CERN |
description | <!--HTML--><p>Cloud services are being widely adopted at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p>
<ul>
<li>How to make sure only enterprise level services are used?</li>
<li>Are regulation rules respected?</li>
<li>How to avoid leakage of confidential data?</li>
<li>How has the threat attack vector in a perimeterless world evolved and what can be done about it?</li>
</ul>
<p>We will present in this talk the main issues associated to the security of cloud services, and the strategies adopted by Netskope to address them.</p> |
id | cern-2648577 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2018 |
record_format | invenio |
spelling | cern-26485772022-11-02T22:27:47Zhttp://cds.cern.ch/record/2648577engSimic, DarkoSecuring the Cloud: the lurking threats behind the scenesSecuring the Cloud: the lurking threats behind the scenesCERN Computing Seminar<!--HTML--><p>Cloud services are being widely adopted at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p> <ul> <li>How to make sure only enterprise level services are used?</li> <li>Are regulation rules respected?</li> <li>How to avoid leakage of confidential data?</li> <li>How has the threat attack vector in a perimeterless world evolved and what can be done about it?</li> </ul> <p>We will present in this talk the main issues associated to the security of cloud services, and the strategies adopted by Netskope to address them.</p>oai:cds.cern.ch:26485772018 |
spellingShingle | CERN Computing Seminar Simic, Darko Securing the Cloud: the lurking threats behind the scenes |
title | Securing the Cloud: the lurking threats behind the scenes |
title_full | Securing the Cloud: the lurking threats behind the scenes |
title_fullStr | Securing the Cloud: the lurking threats behind the scenes |
title_full_unstemmed | Securing the Cloud: the lurking threats behind the scenes |
title_short | Securing the Cloud: the lurking threats behind the scenes |
title_sort | securing the cloud: the lurking threats behind the scenes |
topic | CERN Computing Seminar |
url | http://cds.cern.ch/record/2648577 |
work_keys_str_mv | AT simicdarko securingthecloudthelurkingthreatsbehindthescenes |