Cargando…

Securing the Cloud: the lurking threats behind the scenes

<!--HTML--><p>Cloud services are being widely adopted&nbsp;at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p> <u...

Descripción completa

Detalles Bibliográficos
Autor principal: Simic, Darko
Lenguaje:eng
Publicado: 2018
Materias:
Acceso en línea:http://cds.cern.ch/record/2648577
_version_ 1780960688918757376
author Simic, Darko
author_facet Simic, Darko
author_sort Simic, Darko
collection CERN
description <!--HTML--><p>Cloud services are being widely adopted&nbsp;at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p> <ul> <li>How to make sure only enterprise level services are used?</li> <li>Are regulation rules respected?</li> <li>How&nbsp;to avoid leakage of confidential data?</li> <li>How has the threat attack vector in a perimeterless world evolved and what can be done about it?</li> </ul> <p>We will present in this talk&nbsp;the main issues&nbsp;associated to the security of cloud services, and the strategies adopted by Netskope to address them.</p>
id cern-2648577
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2018
record_format invenio
spelling cern-26485772022-11-02T22:27:47Zhttp://cds.cern.ch/record/2648577engSimic, DarkoSecuring the Cloud: the lurking threats behind the scenesSecuring the Cloud: the lurking threats behind the scenesCERN Computing Seminar<!--HTML--><p>Cloud services are being widely adopted&nbsp;at an unprecedented pace, and the business models evolve with the technology shift. But, is this happening at the right speed? This evolution might cause some sleepless nights for the Computer Security teams:</p> <ul> <li>How to make sure only enterprise level services are used?</li> <li>Are regulation rules respected?</li> <li>How&nbsp;to avoid leakage of confidential data?</li> <li>How has the threat attack vector in a perimeterless world evolved and what can be done about it?</li> </ul> <p>We will present in this talk&nbsp;the main issues&nbsp;associated to the security of cloud services, and the strategies adopted by Netskope to address them.</p>oai:cds.cern.ch:26485772018
spellingShingle CERN Computing Seminar
Simic, Darko
Securing the Cloud: the lurking threats behind the scenes
title Securing the Cloud: the lurking threats behind the scenes
title_full Securing the Cloud: the lurking threats behind the scenes
title_fullStr Securing the Cloud: the lurking threats behind the scenes
title_full_unstemmed Securing the Cloud: the lurking threats behind the scenes
title_short Securing the Cloud: the lurking threats behind the scenes
title_sort securing the cloud: the lurking threats behind the scenes
topic CERN Computing Seminar
url http://cds.cern.ch/record/2648577
work_keys_str_mv AT simicdarko securingthecloudthelurkingthreatsbehindthescenes