Cloud

4/13/2018
08:30 AM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

7 Steps to a Smooth, Secure Cloud Transition

Security leaders share their top steps to keep in mind as your organization moves data and applications to the cloud.
2 of 8

Fully Embrace the Cloud
Oftentimes organizations think about the cloud provider's infrastructure as an extension of their own, 'bringing an old-school legacy mentality' to cloud adoption, says Patrick Foxhoven, CIO and vice president of emerging technologies at ZScaler.
'A lot of times, companies will think about how to pin their corporate network with the cloud provider's environment and run physical circuits stitching the two together,' he says. As a result, connectivity is static and businesses miss certain advantages, like achieving the full portability and elasticity of the cloud.
Foxhoven attributes the misstep to a lack of insight and education around the new capabilities that cloud can provide, as well as 'unwillingness to think about new things.'
(Image: Sergey Nivens via Shutterstock)

Fully Embrace the Cloud

Oftentimes organizations think about the cloud provider's infrastructure as an extension of their own, "bringing an old-school legacy mentality" to cloud adoption, says Patrick Foxhoven, CIO and vice president of emerging technologies at ZScaler.

"A lot of times, companies will think about how to pin their corporate network with the cloud provider's environment and run physical circuits stitching the two together," he says. As a result, connectivity is static and businesses miss certain advantages, like achieving the full portability and elasticity of the cloud.

Foxhoven attributes the misstep to a lack of insight and education around the new capabilities that cloud can provide, as well as "unwillingness to think about new things."

(Image: Sergey Nivens via Shutterstock)

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10869
PUBLISHED: 2018-07-19
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
CVE-2018-10870
PUBLISHED: 2018-07-19
redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution.
CVE-2018-12959
PUBLISHED: 2018-07-19
The approveAndCall function of a smart contract implementation for Aditus (ADI), an Ethereum ERC20 token, allows attackers to steal assets (e.g., transfer all contract balances into their account).
CVE-2018-14336
PUBLISHED: 2018-07-19
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-10620
PUBLISHED: 2018-07-19
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code t...