11Cybersecurity in the Cloud
FATIMA BOOLANI
The shift to the cloud is unstoppable, and there is no turning back.
The move away from the “undifferentiated heavy lifting” of running IT stacks and home-grown enterprise software has not only given rise to a tsunami of born-digital startups, but is spurring voracious adoption of cloud computing by companies of all sizes and stripes.
Manifesting in cloud-based front-office application modernization, back-office infrastructure transformation, and software-enabled business process automation, these initiatives are satisfying the intensifying demands for agility, efficiency, and innovation across the modern enterprise. With cloud computing enabling the effective handover of entire technology stacks to third parties—from infrastructure to middleware to applications—companies have been liberated to focus on doing what they do best, which in almost all cases is not procuring, building, administering, and maintaining software and IT plumbing systems.
Yet against this backdrop, the stakes for organizational cyber defense, protection, and response have never been higher. Now, organizations face not only existing threats, but also new cyber obstacles that come with the brave new world of the cloud, characterized by greater vendor and functional fragmentation, as well as increasingly distributed and heterogeneous network architectures.
This comprehensive outsourcing, and straddling of public cloud (Amazon AWS, Microsoft Azure, Google GCP), ...
Get Fight Fire with Fire now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.