article thumbnail

What Is cloud security?

Lacework

The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online. Compliance issues — When sensitive data is stored in the cloud, it becomes subject to more data protection regulations. Secure Endpoints. Access Management. API security risks.

Cloud 98
article thumbnail

When least privilege is the most important thing

CIO

When this no longer became tenable, Microsoft led the way and started its Trustworthy Computing initiative in 2002. Similarly, a compliance tool that plugs into corporate cloud email systems demands read-and-write access to all user mailboxes. Read access makes sense; write access does not. Implement compensating controls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Over that time, security and regulatory compliance grew more important and Elfering worked his way to network security manager and then to senior director of information security before reaching his current role. We recognized a commercial opportunity and we sold them a firewall. That was my first commercial firewall set up.

article thumbnail

Managing Access Requests and Segregation of Duties Compliance

Saviynt

Using the built-in dashboards to monitor compliance with internal controls becomes overwhelming as users request access to additional resources. What is Segregation of Duties (SOD) compliance risk? In the early 2000s, a series of corporate scandals led to the United States Congress passing the Sarbanes-Oxley Act of 2002 (SOX).