Beware the Toxic Cloud Trilogy – a discussion with Tenable

Loading player...
Companies moving to the cloud – and those already there – need to be aware of the Toxic Cloud Trilogy, three pitfalls in cloud computing that must be avoided.
Bernard Montel, technical director at exposure management company Tenable for Europe, the Middle East and Africa, recently unpacked this for TechCentral’s audience in an episode of TCS+ (watch or listen to the interview below).
Montel unpacked what the three risk factors are that make up the Toxic Cloud Trilogy – critical vulnerabilities, excessive permissions and public exposure – and how to deal with each of them effectively.
Tenable recently published its 2024 Tenable Cloud Risk Report, which examines findings by the Tenable Cloud Research team based on telemetry from millions of cloud resources across multiple public cloud repositories.
In this episode of TCS+, Montel discusses:
• Tenable, its history and its focus areas in the information security industry;
• Why companies should take the Toxic Cloud Trilogy seriously, and how it amplifies risk for organisations;
• The key findings in Tenable’s Cloud Risk Report and what they mean in practice, including addressing the Toxic Cloud Trilogy; and
• How Tenable Cloud Security can help companies overcome the Toxic Cloud Trilogy.
If you’re involved in protecting your organisation’s data and assets in the cloud, don’t miss this important discussion.
6 Dec 2024 English South Africa Technology · Business

Other recent episodes

Cassava’s Adil El Youssefi on data centre growth in Africa

In this episode of TCS+, Adil El Youssefi, newly appointed CEO of the colocation business at Cassava Technologies and CEO of Africa Data Centres, chats about the challenges and opportunities in sub-Saharan Africa. El Youssefi delves into: • His background prior to being appointed into the role and how it…
13 Aug 30 min

Zahir Cajee on Samsung’s new Galaxy Z Fold7, Flip7 and Watch8 line-up

Folding phones are advancing at light speed. For consumers, the appeal is self-evident: on one hand, folding phones give them the option to have a larger, tablet-like interface that offers enhanced productivity and a better user experience. On the other hand, the fit-in-your-pocket design when folded maintains easy portability. Samsung…
31 Jul 18 min

Lessons from South Africa’s biggest cyberattacks

IT security breaches are on the rise in South Africa and worldwide, and with AI tools at their disposal, criminals are scaling up their attacks. With the risk of attack so high, organisations are forced to look beyond beefing up security – they must prepare for the unfortunate event where…
25 Jul 15 min

First Distribution’s guide to a bulletproof cyber crisis response strategy

In cybersecurity, prevention is always better than cure. However, organisations have to prepare for the worst-case scenario, one where their systems are breached by cybercriminals. This is the second in a series of three podcasts on how to manage cyber crises effectively when they happen. The first episode – watch…
24 Jul 11 min

How cyberthreats turn into cyber crises

In today's hyperconnected society, a cybersecurity crisis isn’t just a technical glitch; it's a profound disruption that can bring businesses, governments and even entire countries to a halt. For organisations to protect themselves effectively, they must understand what cybercriminals are capable of, where the vulnerabilities in their own systems are…
23 Jul 13 min