How will GDPR affect your US-based business?

How will GDPR affect your US-based business?

The GDPR Affect From the 25rh of May, 2018, the laws governing data storage and personal privacy in the European Union will undergo a comprehensive overhaul as the General Data Protection Regulation comes into force. For companies based in the EU, this deadline looms large
The AWS Cloud Goes Underground at re:Invent

The AWS Cloud Goes Underground at re:Invent

As you wander through the AWS re:Invent campus, take a minute to think about your expectations for all of the elements that need to come together… Starting with the location, my colleagues have chosen the best venues, designed the sessions, picked the speakers, laid out the menu,

CONTRIBUTORS

How Will Artificial Intelligence Really Impact Jobs?

How Will Artificial Intelligence Really Impact Jobs?

Artificial Intelligence Jobs Hamilton is my favorite Broadway musical. The show follows the life of one of America’s founding fathers, ...
2017 Brings DLP Technology and IoT's Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP ...
Four Trends and Realities Confronting Security Today

Four Trends and Realities Confronting Security Today

Realities Confronting Security Today, the number of attempted data breaches, cyber attacks, and other bad behavior by bad actors continues ...

RECENT NEWS

Amazon picks New York City, Virginia for $5 billion new headquarters

Amazon picks New York City, Virginia for $5 billion new headquarters

SAN FRANCISCO (Reuters) - Amazon.com Inc (AMZN.O) said on Tuesday it will build offices for up to 25,000 people in ...
Capgemini in Gartner Magic Quadrant

Capgemini in Gartner Magic Quadrant

Paris, November 9, 2018 – Capgemini, today announced that Capgemini (Prosodie) has been positioned as a Leader by Gartner in its ...
Pressure grows on Zuckerberg to attend Facebook committee hearing

Pressure grows on Zuckerberg to attend Facebook committee hearing

Australia, Argentina and Ireland join UK and Canada in urging Facebook CEO to give evidence to parliaments Parliamentary committees from ...
The New Industrial Revolution – According to the WSJ

The New Industrial Revolution – According to the WSJ

The insert in today’s US print edition of the Wall Street Journal is called The New Industrial Revolution. The paper updates ...
Batteryless smart devices closer to reality

Batteryless smart devices closer to reality

Researchers at the University of Waterloo have taken a huge step towards making smart devices that do not use batteries ...
security-image

Cloud Infographic – What Are Cloud Access Security Brokers (CASBs)?

What Are Cloud Access Security Brokers?

Security is, I would say, our top priority because for all the exciting things you will be able to do with computers – organizing your lives, staying in touch with people, being creative – if we don’t solve these security problems, then people will hold back.” – Bill Gates

Cloud Access Security Brokers, known as CASBs, are opening a brand new window into our everyday security and safety with regard to information and high-technology trends. Increasingly, cloud-focused applications and services applied by enterprises are going to be kept much more secure with the help of CASB platforms by 2016.

Gartner Inc., has recently announced a top 10 technological advances for information security. Here they are:

1) Cloud Access Security Brokers – cloud-based points, which are used for security policy enforcement purposes, and are placed between cloud service providers and cloud service consumers.

2) Adaptive Access Control – a type of control with context awareness access.

3) Pervasive Sandboxing (Content Detonation) and IOC Confirmation – a great option to detect intrusions as soon as possible, and to reduce hackers’ chances to cause damage to sensitive information.

4) Endpoint Detection and Response Solutions – used to record numerous network events and endpoints, and store the information in a centralized database.

5) Big Data Security Analytics at the Heart of Next-generation Security Platforms – a fine option for storing your monitoring data to carry out retrospective analysis.

6) Machine-readable Threat Intelligence, Including Reputation Services – a form of real-time and dynamic rating to be used for the integration with intelligence feeds and external context.

7) Containment and Isolation as a Foundational Security Strategy – an excellent means to create a defense-in-depth protection for enterprise systems.

8) Software-defined Security – aims at moving the intelligence and value into software.

9) Interactive Application Security Testing – used to provide a higher level of accuracy of application security testing via the interaction of the DAST (dynamic application security testing) and SAST (static application security testing) techniques.

10) Security Gateways, Brokers and Firewalls to Deal with the Internet of Things – associated with the Internet of Things and directed towards providing security and protection for future interconnected devices, sensors and systems, which will mainly be controlled without human involvement.

Below, you can find an interesting infographic on CASBs provided by bitglass.com

Def.Guide-CASBs

By Lilit Melkonyan

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.