Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Beyond The App Store: Cloud Marketplace Security

27:26
 
Share
 

Manage episode 483143670 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Takeaways

  • #Cloudmarketplaces function like a digital mall for various services.
  • Continuous monitoring and detection of threats are essential.
  • Legislation like NIST 2 and Dora impacts cloud security practices.
  • Zero trust methodology is advised in securing cloud connections.
  • Regular penetration testing and vulnerability management are necessary.
  • Data strategy is key when implementing #AI in cloud services.
  • Centralising identity management can limit security risks.

Summary

On the #SecurityStrategistpodcast, host Keyari Page delves into the dynamic world of cloud marketplace ecosystems with Mostyn Thomas, Senior Director of Security at Pax8.

Listeners can gain a comprehensive understanding of these digital hubs where IT professionals and managed service providers (MSPs) can select from a diverse range of services.

Imagine a digital "mall," that's essentially a cloud marketplace. Within it, organisations can find "stores" that offer everything from identity and access management and cutting-edge API security.

The conversation also explores the crucial challenge of establishing secure cloud connections, where Thomas emphasises the importance of a "zero trust" security model.

This approach requires a diligent verification process for every connection and user within the cloud environment, regardless of location or perceived trustworthiness.

Tune in to learn its potential and evolving security challenges that must be addressed to ensure a safe and reliable experience for all stakeholders.

For the latest tech insights visit: em360tech.com

  continue reading

156 episodes

Artwork
iconShare
 
Manage episode 483143670 series 2948336
Content provided by EM360Tech. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by EM360Tech or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Takeaways

  • #Cloudmarketplaces function like a digital mall for various services.
  • Continuous monitoring and detection of threats are essential.
  • Legislation like NIST 2 and Dora impacts cloud security practices.
  • Zero trust methodology is advised in securing cloud connections.
  • Regular penetration testing and vulnerability management are necessary.
  • Data strategy is key when implementing #AI in cloud services.
  • Centralising identity management can limit security risks.

Summary

On the #SecurityStrategistpodcast, host Keyari Page delves into the dynamic world of cloud marketplace ecosystems with Mostyn Thomas, Senior Director of Security at Pax8.

Listeners can gain a comprehensive understanding of these digital hubs where IT professionals and managed service providers (MSPs) can select from a diverse range of services.

Imagine a digital "mall," that's essentially a cloud marketplace. Within it, organisations can find "stores" that offer everything from identity and access management and cutting-edge API security.

The conversation also explores the crucial challenge of establishing secure cloud connections, where Thomas emphasises the importance of a "zero trust" security model.

This approach requires a diligent verification process for every connection and user within the cloud environment, regardless of location or perceived trustworthiness.

Tune in to learn its potential and evolving security challenges that must be addressed to ensure a safe and reliable experience for all stakeholders.

For the latest tech insights visit: em360tech.com

  continue reading

156 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play