Just days after meeting with Ms. Helen Robinson of the Colorado Springs Business Journal to discuss the risks of using Cloud Service Providers, the Capitol One breach occurred.
Helen highlights a key point in our conversation, “’You can’t say Google does all of your security,’ Titcombe said. ‘You can inherit controls for security from them only to a point.'” In this case, the hacker was a former Amazon employee with insider knowledge of CapitolOne’s weaknesses.
Social Contact