How Decentralization Defends Against the Top 5 Security Threats

Logo
Presented by

John Gleeson, Storj COO and Ingrum Jefferson, Storj Security Systems Engineer

About this talk

In the current climate of high-profile data breaches, rampant ransomware, and a shifting government regulatory environment, development teams are increasingly taking on the responsibility of integrating security design and best practices into all stages of the software development lifecycle (SDLC). In this webinar, John Gleeson, Storj COO and Ingrum Jefferson, Security Systems Engineer, discuss how a shift in security focus across the SDLC is impacting development teams and the cloud storage solutions they choose. The speakers cover the top five most common threats and how you can improve the security of your cloud storage layer, and help lead the charge to a security-first development cycle through utilizing the inherent benefits of the decentralized cloud. The 5 top threats include: - Insider Threats & Negligence - Phishing - Leaky buckets and cloud storage - Hacking & Data Breaches -Targeted Ransomware Attacks Join us for an in-depth discussion about important issues and topics and how a decentralized model can provide a better defense.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (595)
Storj (pronounced storage) created the world’s first open source decentralized cloud object storage network, Storj DCS (Decentralized Cloud Storage). Storj DCS is private by design and secure by default, delivering unparalleled data protection and privacy versus centralized cloud object storage alternatives. Default encryption, user-assigned access controls, affordable and predictable pricing, a robust library of technical documentation, and a vibrant user community enable developers to confidently, easily, and economically leverage decentralized technology to take control of their data.