-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response in the Age of Cloud
By :

Cloud platforms are exposed to a great many security threats in the modern computing landscape. However, organizations have finite resources to respond to or protect their virtual computing environments from these risks. The traditional security approach of developing a perimeter of defenses around assets is not effective in ensuring security for a wide range of attacks. There are complexities with cloud computing that are introduced by roaming endpoints, applications owned by third parties, and a lack of transparency and control over the underlying hardware. Hence, security teams are turning to a new approach to security that involves the adoption of SOAR.
SOAR involves the convergence of three categories of security:
Security orchestration and automation involves the use of systems that monitor workflows and internal processes...
Change the font size
Change margin width
Change background colour