Deploying Cloud Security for Shifting and Evolving Defenses

Most attacks, like the recent DDoS attacks on banks, show most hackers do not use brute force to gain entry to sensitive data. And as organizations expand the perimeter of their networks,, there are so many more opportunities for data leakage and theft. To control it, a more nimble, flexible and agile strategy of defense is necessary…and that can come from the cloud.
A few weeks back I was watching my beloved San Diego Chargers lose in a most embarrassing way on Monday night. And in the waning seconds of blaming the quarterback for such ineffectual 2nd half play, it occurred to me, it wasn’t his fault. It was the coach. It was the lack of planning for the type of attack the Denver Broncos would bring. It was the lack of leadership that should have easily closed the deal. In short, it was sticking to the status quo while everything around was changing.

read more