When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.


Article Link: http://feedproxy.google.com/~r/BusinessInsightsInVirtualizationAndCloudSecurity/~3/TkBsW2jDCcU/cloud-computing-insider-threat