Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management

by Jennifer Johns
Sept. 1, 2017 1 comment SANS Institute Apps & Hardening cloud computing

Businesses are leveraging cloud computing services at an exponential rate. Working in the information security industry during the cloud computing frenzy is exciting, but it is also proving to be challenging as cloud computing service providers (CSPs) have typically lacked industry standard security controls.

Irina Alexandra Negrii 8 months, 1 week ago

As users and devices have moved outside the firewall and IT control, identity, in particular IDaaS, has become the new perimeter. By injecting enterprise grade authentication and security policies into these cloud-based resources, IDaaS protects the organization from risks not addressed by today’s perimeter and endpoint tools.