This white paper, published by ESET, discusses the widespread move by businesses to hybrid cloud computing, security risks associated with this model, and how businesses and organizations can adopt a modernized, scalable cybersecurity solution to these risks.
Cybersecurity for Hybrid Cloud Environments
Approved
CDPO, CDPO/BR, CDPO/FR, CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT, LGPD
Credits: 3
Related Stories
Cloud Computing
This topic page contains a curation of the IAPP's coverage, analysis and relevant resources covering cloud computing....
NASCIO Report: State CIO use of the Cloud
This report, published by NASCIO, details a new study on increased interest in cloud computing in state governments, as well as state CIOs’ views on the adoption of cloud technology.
Click To View (PDF)
...
Cloud Controls Matrix
The Cloud Security Alliance Cloud Controls Matrix is designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understa...
Conducting Data Privacy Impact Assessment on Your Cloud Environments
Original broadcast date: 5 August 2021
Whether you're creating a new product, going through a merger or acquisition, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from the slew of cloud data breaches, no...
How To Implement a Cloud PbD System
This slide deck by Karen Frenkel for CIO Insight offers tips for working with cloud access security brokers and implementing privacy by design into cloud systems.
Click To View
...