Lessons about Cloud Security from 1980s Horror Movies
Recently, Kayne McGladrey, Integral Partners Information Security Director, published an article in the March 2017 ISSA Journal that discusses how businesses can apply three fundamental best practices for adapting current security programs to mitigate insider threats as applications and data migrate to the cloud. We recommend that businesses work to establish a baseline of normal operations under the assumption that one or more bad actors will be identified during this phase. Next, companies should work to deploy meaningful alerts so that security managers can act without being overwhelmed. Finally, organizations should create friction for bad actors by deploying modern step-up authorization technologies.