Why Securing The Cloud Is A Math Problem
In his recent article for the Forbes Technology Council, Shai Morag explains that despite what you may think, there actually is a security perimeter in the cloud. It’s not the type we’re accustomed to protecting, though. He explains that identity is the perimeter because “all an attacker needs to compromise cloud security controls are the […]
In his recent article for the Forbes Technology Council, Shai Morag explains that despite what you may think, there actually is a security perimeter in the cloud. It’s not the type we're accustomed to protecting, though. He explains that identity is the perimeter because "all an attacker needs to compromise cloud security controls are the appropriate credentials."
He goes on to outline and explain the top three challenges of defending identities in the cloud:
- Too many identities
- Machine identities
- Entitlements
Read the full Forbes Technology Council article here.
***
Forbes Technology Council is an invitation-only organization for senior-level technology executives. Members are respected tech leaders selected for the council based on their deep knowledge and diverse experience in the industry.