Cloud computing and the amplified insider threat

fingerprint.jpg

When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.

Article Link: http://feedproxy.google.com/~r/BusinessInsightsInVirtualizationAndCloudSecurity/~3/TkBsW2jDCcU/cloud-computing-insider-threat