Sunday, June 22, 2025

Agentforce London: Salesforce Reports 78% of UK Companies Embrace Agentic AI

WhatsApp Aims to Collaborate with Apple on Legal Challenge Against Home Office Encryption Directives

AI and the Creative Industries: A Misguided Decision by the UK Government

CityFibre Expands Business Ethernet Access Threefold

Fusion and AI: The Role of Private Sector Technology in Advancing ITER

Strengthening Retail: Strategies for UK Brands to Combat Cyber Breaches

Apple Encryption Debate: Should Law Enforcement Use Technical Capability Notices?

Sweden Receives Assistance in Strengthening Its Sovereign AI Capabilities

MPs to Explore Possibility of Government Digital Identity Program

Choosing the Best Cloud Security Provider for Data Protection

Cloud security can be intimidating for CISOs and risk practitioners, with concerns about data ownership and access. However, cloud computing actually offers enhanced observability through APIs that require authentication, authorization, and auditing for every action. As more organizations embrace public cloud for its benefits, including security protections and the ability to respond to threats in real-time, it is important to ensure data protection and validate cloud providers’ security measures.

One key consideration is data location and access control, including where authentication credentials are stored and accessed. Encryption and key management are essential for protecting data, with services like AWS KMS simplifying the process of managing keys. Organizations can also verify their cloud provider’s security claims through compliance certifications and third-party audits.

By leveraging cloud-native security solutions, organizations can align security measures with business objectives and choose the most effective security solutions. This approach allows for a tailored security strategy based on individual needs rather than a one-size-fits-all solution. Stephen McDermid, EMEA CSO at Okta, emphasizes the importance of maximizing cloud security capabilities to meet both business and security goals.