Cloud Security , Security Operations

Why Better Visibility Is Key to Better Cloud Security

Forepoint's Homayun Yaqub on Overcoming Cloud Security Challenges
Homayun Yaqub, senior director of strategy, Forcepoint

Because so many organizations have shifted to a remote workforce, cloud services have become essential, creating new risks. Homayun Yaqub of Forcepoint explains why greater visibility is the key to better security in the new environment.

See Also: Webinar | Fortify, Comply and Simplify Sensitive Data Security and Privacy Using a File Centric, Protect First Approach

In a video interview with Information Security Media Group, Yaqub discusses takeaways from a recent series of virtual roundtables on this subject, including:

  • What lessons organizations can learn about security in the cloud;
  • How organizations can address security in an era when the perimeter has disappeared;
  • Why organizations need more visibility in the cloud to ensure assets and data are secure.

Yaqub, senior director of strategy at Forcepoint, partners with executives across various verticals to architect and deliver Forcepoint solutions to address human-centric business issues and better enable security/risk managers to safeguard their assets. Before joining Forcepoint, Yaqub was an executive director on JP Morgan Chase's global security team, leading the firm's global safeguard program. Earlier, he served in several roles at the Department of Defense.


About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, News Desk

Ferguson is the managing editor for the news desk at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.