ALL POSTS BY: Tim Layton

Tim Layton specializes in demystifying the complexities and technical jargon associated with cloud computing security and risk management. Tim is a cloud security thought leader defining actionable and defensible strategies to help enterprise stakeholders make risk-based decisions and prioritize investments in the new digital frontier.

Showing: 1 - 28 of 28 RESULTS
Amazon Inspector For Automating Security Assessments & Remediations In AWS by Tim Layton @ CloudSecurityLaunchPad.com

Amazon Inspector For Automating Security Assessments & Remediations In AWS

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It assesses applications for vulnerabilities or deviations from best practices developed by AWS. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity that can and should be reviewed by qualified information security professionals.

Understanding Auditing On The AWS Platform by Tim Layton @ CloudSecurityLaunchPad.com

Understanding Auditing On The AWS Platform

The AWS Management Console, along with the AWS CLI, can produce powerful results for auditors across multiple regulatory, standards, and industry authorities. I am going to cover some of the key sources that produce important and meaningful log information that you can use within your audit and compliance program.

Orchestration Threats For SD-WAN by Tim Layton

Orchestration Threats For SD-WAN

I recently wrote an article describing four main threats for SD-WAN that can be used as a checklist for cybersecurity professionals and enterprise stakeholders when reviewing and implementing SD-WAN. In this article today, I am going to dive deeper into Orchestration Layer Threats for SD-WAN and some key points for consideration.

SD-WAN Security Threat Checklist by Tim Layton

SD-WAN Security Threat Checklist

Software Defined Wide Area Networking (SD-WAN) is quickly becoming an enterprise staple to help control costs, reduce application latency, and reduce network downtime. However, with all of those benefits come with new cybersecurity threats and risks that should be considered and evaluated prior to deployment.