By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech MarketerThe Tech MarketerThe Tech Marketer
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Reading: Seagate, Erez Baum: How to manage cloud security and consistency
Share
Notification Show More
Font ResizerAa
The Tech MarketerThe Tech Marketer
Font ResizerAa
  • Home
  • Technology
  • Entertainment
  • Marketing
  • Politics
  • Visionary Vault
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Have an existing account? Sign In
Follow US
© The Tech Marketer. All Rights Reserved.
The Tech Marketer > Blog > Technology > Seagate, Erez Baum: How to manage cloud security and consistency
Technology

Seagate, Erez Baum: How to manage cloud security and consistency

Last updated:
3 years ago
Share
SHARE

Could you tell us a little bit about your company? What type of products and services do you offer?

Contents
Oh hi there 👋It’s nice to meet you.Sign up to receive awesome content in your inbox, every week.

We craft the datasphere, helping to maximize humanity’s potential by innovating world-class, precision-engineered data storage and management solutions with a focus on sustainable partnerships. A global technology leader for more than 40 years, the company has shipped over three billion terabytes of data capacity.

Have there been any particularly interesting developments at Seagate?

Last year we introduced Lyve Cloud, a simple, trusted, and efficient object storage cloud service for mass data. It provides cost competitive object storage designed to tear down the barriers between clouds.

With no egress or API fees, you can move your data seamlessly across private, public, and compute clouds – accessing it wherever and whenever you need it.

Lyve Cloud is designed to provide unparalleled multicloud freedom – no egress fees, no API fees, and no vendor lock-ins; storage designed for multicloud freedom; simple, predictable, capacity-based pricing; and best-in-class security and availability.

What do you think will be the most problematic future cloud-based threat vectors? And what advice would you give to companies regarding how they can deal with this?

We continue to see a credential thief as a top threat agent against cloud environments. Adversaries apply different tactics to harvest legitimate authentication credentials, (e.g., targeted victim-tailored phishing attacks). 

We suggest companies consider, number one, fully deploying and enabling MFA (Multi-Factor Authentication), not only to important accounts but also across the enterprise to prevent lateral movement. Secondly, disabling legacy (weak) authentication protocols. And thirdly, implementing access controls and applying the least-privilege principle for users and cloud services throughout the enterprise.

To what extent do you think the consequences of a data breach are worse than ever before?

Data privacy controls are critical for protecting the variety and value of today’s digital transformation data. A data breach is not just about losing intellectual property or competitive business information, it can be weaponized to impact a variety of things, from human safety to a country’s economy, quickly. For example, a data breach could prevent a doctor from performing a time sensitive medical procedure, allow an imposter to impersonate a victim, disrupt city water or electricity supplies, or manipulate a financial market.

What are the main pitfalls when it comes to configuring cloud storage?

When it comes to configuring cloud environments including cloud storage, inconsistency, human error, and not following security best practices are the main pitfalls. A common misconfiguration that can easily be prevented is allowing unauthenticated public access to cloud storage buckets.

What advice would you give to companies that are attempting to prevent compliance violations?

Select prioritised Information Security control metrics and share weekly metric data vs. control metric requirements to drive the right personnel compliance behaviours every day. Ensure that Information Security threats and vulnerabilities are discovered, contained, mitigated with appropriate controls, and then permanently remediated in a timely manner.

Conduct internal independent audits to ensure that the Information Security controls are operating properly. From these audits, implement cross-functional improvement actions. Then, conduct independent external audits to audit Information Security controls for compliance with national and international standards. From these audits, implement cross-functional improvement actions.

How can the risk of a data breach be reduced with a comprehensive policy?

An organisation’s risk appetite should be defined in a comprehensive security policy and then translated into a security requirement, i.e., constructing a secure environment based on industry standard security frameworks. To effectively reduce risks, the security policy must be enforceable, sustainable, and adopted by the entire organisation. The security policy needs to be periodically reviewed and updated.  

What plans does Seagate have for the year ahead?

We’ll continue to innovate on all fronts, from providing best of class object storage as a service, to providing a wide variety of features, tools and compatible partner solutions, allowing our customers to safely store and activate their mass-capacity data lakes.

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

You Might Also Like

Meta Scams Crackdown: 150,000 Accounts Disabled as Global Fraud Sweep Produces 21 Arrests

NASA Satellite Crashing: Van Allen Probe A Set for Fiery Reentry Years Ahead of Schedule

Instagram Down: Global Outage Leaves Users Unable to Send DMs as Reports Surge Past 12,000

Mario Day 2026: Best Mar10 Nintendo Switch Deals, Events, and Everything Else Happening Today

xAI Grok Edit Blocker: X Quietly Releases Per-Image Photo Toggle After Months of Controversy

Share This Article
Facebook LinkedIn Email Copy Link Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Adobe Learning Summit 2022 Adobe Learning Summit 2022
Next Article Benten Technologies: A secure, passwordless future

Latest News

  • Microsoft’s ‘Xbox mode’ is coming to every Windows 11 PC

    Microsoft seems more determined than ever to combine Xbox and Windows - to the point that its next-gen Xbox, codenamed Project Helix, will play PC games too. Today, we learned Helix will go alpha in 2027. But the company isn't waiting for Helix before it points Windows gamers in the Xbox direction. Starting in April,

  • Microsoft’s next Xbox, Project Helix, won’t reach alpha until 2027

    We're here at the 2026 Game Developers Conference, where Microsoft "VP of Next Generation" Jason Ronald is talking about a topic near and dear to many gamers' hearts: the future of Xbox. Ronald says the next Xbox, codenamed Project Helix, will have a custom AMD chip with "an order of magnitude increase in raytracing performance"

  • OpenAI’s Sora video generator is reportedly coming to ChatGPT

    OpenAI's Sora video generator could soon become a built-in feature in ChatGPT, as reported by The Information. Sora is currently only available on its website or as a standalone app, which has fallen shy of the popularity of ChatGPT. This update would allow users to access Sora's video generation capabilities directly within ChatGPT itself, much

  • Alternative app store AltStore PAL is joining the fediverse

    AltStore PAL, the alternative iOS app store available in the European Union and Japan, is joining the social web. In a post on Wednesday, AltStore PAL announced that users across Mastodon, Threads, and Bluesky can now interact with apps that developers choose to federate on its explore.alt.store website. Any likes from the social web will

  • Canva’s new editing tool adds layers to AI-generated designs

    Canva introduced a new feature that separates flat image files and AI-generated visuals into layered, fully editable designs. The Magic Layers tool is launching in public beta today in the US, UK, Canada, and Australia, allowing design components like objects, text boxes, and other graphics to be selected individually while preserving the original layout. "After

- Advertisement -
about us

We influence 20 million users and is the number one business and technology news network on the planet.

Advertise

  • Advertise With Us
  • Newsletters
  • Partnerships
  • Brand Collaborations
  • Press Enquiries

Top Categories

  • Artificial Intelligence
  • Technology
  • Bussiness
  • Politics
  • Marketing
  • Science
  • Sports
  • White Paper

Legal

  • About Us
  • Contact Us
  • Privacy Policy
  • Affiliate Disclaimer
  • Legal

Find Us on Socials

The Tech MarketerThe Tech Marketer
© The Tech Marketer. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?