Page 20 - Cyber Warnings
P. 20







There are an emerging class of cloud security vendors who have architected cloud
security solutions from the ground-up, specifically for cloud solutions.

 Understand Shared Responsibility in the Cloud
Many assume public cloud platform providers like Amazon Web Services (AWS),
Microsoft Azure, Google Cloud Platform and the like protect applications built on their
cloud platforms. In fact, they don’t.

While the cloud platform itself is relatively secure and comes with its own security
controls, those security controls do not extend to applications built on top of it. The
organization must understand the shared responsibility business model and take steps
to protect applications built on public cloud platforms.

 Products + Services
Many organizations, not just small and mid-sized organizations, don’t have the
resources to invest in a strong internal cybersecurity practice, including a Security
Operations Center or SOC.

Many security vendors offer 24x7 fully managed services alongside their security
technology solutions to identify, alert and help prioritize security incidents for their
customers, incidents which can lead to breaches.

Many view the Products + Services advantage as the optimal way to ensure their
sensitive data, and the sensitive data of their customers, remains safe and secure.

The bottom line is this: individuals and organizations should not assume that cybersecurity
legislation alone can protect them against cyberattacks. Instead, they need to take the
appropriate steps to ensure that they are protecting themselves.

About the Author

Paul Fletcher has over 20 years of experience in information technology
and security. Prior to joining Alert Logic, Fletcher advised executives in the
energy, retail, and financial sectors regarding emerging security threats and
mitigation strategies. Additionally, he has worked with Fortune 50
organizations, the Department of Defense, and critical infrastructure
organizations to implement risk management plans and security solution
designs.

His other specialties include network security, customer data integrity, application security,
forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of
Arts and Bachelor of Science degree and is a Certified Information Systems Security
Professional (CISSP).



20 Cyber Warnings E-Magazine – February 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   15   16   17   18   19   20   21   22   23   24   25