
Sign up to save your podcasts
Or
My Cloud Computing Reflections
Week 8: Security in the cloud
Transcript:
Welcome to my cloud computing reflections. My name is Charles Roberts. This is the eighth and final week where I listen to a new podcast and go over what new topics I learned, how it challenges my initial thoughts or beliefs, and how it applies to my personal or professional life.
This week, I listened to episode 24 of cloud cast titled cloud passage, security in the cloud with special guest Rand Wagner. Wanger is the vice president of Cloud Passage, a security-based service to help monitor user accounts and protect user data from outside cyber threats.
Wagner’s cloud security service has special features that make it stand out from the competition. Cloud Passage allows the admin to see exactly where one’s personal account was used if not by the owner. For example, if an unauthorized user from another country makes an online purchase via amazon account, then Cloud Passage alarms the admins. These cyber-attacks have been reported to cost tens of millions of dollars for enterprises (Maurer, 2020).
Security is not a product; it is a way of thinking. Most people, including myself, perceive cloud security as setting up the right firewall. However, cloud architecture is constantly growing, and servers are constantly shifting. The key to security is to first address how scalable and elastic the business is or will be, and then you build a security measure around it. In other words, you build the castle before you build the moat.
To close out this podcast, this cloud cast podcast gives helpful insight on how to keep the cloud secure for all users. As Wagner mentioned, the base functions of Cloud Passage are free for all users, which includes account monitoring. With an open-source cloud provider and a free cloud security service, it is now easier than ever to create a reliable cloud-based platform for personal or commercial use.
That’s all for now, thanks to those who listened all the way through. until we meet again. Podcast out.
References
Maurer, T., & Hinck, G. (2020). Cloud Security. In Cloud Security: A Primer for Policymakers (pp. 22–37). Carnegie Endowment for International Peace.
My Cloud Computing Reflections
Week 8: Security in the cloud
Transcript:
Welcome to my cloud computing reflections. My name is Charles Roberts. This is the eighth and final week where I listen to a new podcast and go over what new topics I learned, how it challenges my initial thoughts or beliefs, and how it applies to my personal or professional life.
This week, I listened to episode 24 of cloud cast titled cloud passage, security in the cloud with special guest Rand Wagner. Wanger is the vice president of Cloud Passage, a security-based service to help monitor user accounts and protect user data from outside cyber threats.
Wagner’s cloud security service has special features that make it stand out from the competition. Cloud Passage allows the admin to see exactly where one’s personal account was used if not by the owner. For example, if an unauthorized user from another country makes an online purchase via amazon account, then Cloud Passage alarms the admins. These cyber-attacks have been reported to cost tens of millions of dollars for enterprises (Maurer, 2020).
Security is not a product; it is a way of thinking. Most people, including myself, perceive cloud security as setting up the right firewall. However, cloud architecture is constantly growing, and servers are constantly shifting. The key to security is to first address how scalable and elastic the business is or will be, and then you build a security measure around it. In other words, you build the castle before you build the moat.
To close out this podcast, this cloud cast podcast gives helpful insight on how to keep the cloud secure for all users. As Wagner mentioned, the base functions of Cloud Passage are free for all users, which includes account monitoring. With an open-source cloud provider and a free cloud security service, it is now easier than ever to create a reliable cloud-based platform for personal or commercial use.
That’s all for now, thanks to those who listened all the way through. until we meet again. Podcast out.
References
Maurer, T., & Hinck, G. (2020). Cloud Security. In Cloud Security: A Primer for Policymakers (pp. 22–37). Carnegie Endowment for International Peace.