Kanwal Sibal, Chairman, CII Task Force on Cyber Security gives his thoughts on how India is preparing for the future of digital security. Cyber space is rapidly...
How to secure your cloud – before it bursts
2 mins read
Tata Communications' Rajarshi Purkayastha talks about his experience with securing the cloud and why it is crucial to develop a comprehensive cyber-security architecture.
Cloud may be the ‘new normal’, but it still presents something of a confidence conundrum for CIOs when it comes to security. I have been in cyber-security for a good many years now and along the way have met many extremely talented CIOs. And yet, I can only think of one that would attest to having 100% confidence in the security of the cloud, having secured his entire digital architecture. I must mention here that this particular CIO was responsible for managing a very complex architecture, serving internal and external customers, with lots of vendors and contractors involved. An environment many enterprise IT professionals will be familiar with. Here is how he did it. A process of elimination
The next logical move was to try constructing his security architecture on the three states of data: at rest, in motion and in use. Yet, even this tried and tested approach cannot always meet the demands placed on it by the complexities and dynamics of cloud. Back to basics This CIO decided to put these questions to users: What do you do? What devices do you use? What systems do you access? How do you access them? And from where?"The going can get tough, especially on public cloud platforms where security responsibilities are shared and, unfortunately, not everyone is aware of their responsibility or knows how to manage them."


Read Raj’s previous blog on how to avoid turbulence in cloud environments."The lesson here: secure your cloud before it bursts – and avoid a deluge of security issues raining down on your head!"
Leaders In Our Own Right
Explore related solution
Tata Communications' Sumeet Walia, talks about the importance of security while remaining competitive in the face of digital advancements. From speeding up innovation to...
From a cyber-security perspective, last year was certainly eventful! In May, GDPR finally came into effect in Europe, a move that demonstrated how governing bodies are...
What’s next?
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators