The One Thing You Can't Outsource: Risk

The widespread adoption of cloud services is causing a widespread expansion of the attack surface. F5 Labs' David Warburton writes for CSO Australia, discussing how you can still manage risk in an outsourced world.
November 15, 2019
1 min. read

While cloud allows us to offload many responsibilities to third party providers, risk is not one of them. What’s more, is that the rising use of cloud, shared code libraries and other third party resources reduces the visibility and control businesses have over their apps and data – making them even more vulnerable.

Businesses today increasingly deal with fragmented authentication across the organisation. The question is: what can they do to ensure they’re covering all their bases?

First, we need to identify the most common cause of data breaches in the enterprise: identity and access management.

Read the full article published October 14, 2019 here: by CSO Australia.

Join the Discussion
Authors & Contributors
David Warburton (Author)
Director, F5 Labs

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read