Cloud Security , Security Operations , Video

Security of the Cloud vs. Security in the Cloud

TeamLease's Archit Rajesh Shares Strategies for Managing Cloud Security Complexity
Archit Rajesh, group CISO at TeamLease

A large number of security practitioners still don't understand the difference between the security of the cloud and security in the cloud, says Archit Rajesh, group CISO at TeamLease, a human resources company headquartered in India.

See Also: Xi'an Jiaotong-Liverpool University Drives Pageviews with Cloudflare Performance

Cloud service providers take care of security of the cloud for "things like software and networking, edge locations, hardware," but when it comes to security in the cloud, the customer takes care of the data, platform, identity and access management, network traffic encryption, and at times, endpoint security, Rajesh says.

In this video interview with Information Security Media Group, Rajesh also discusses:

  • The complexities of cloud security;
  • The challenges of visibility across a multi-cloud environment;
  • How IAM works in a multi-cloud environment.

Rajesh is responsible for managing the information security posture of TeamLease across all its businesses and products. He previously worked with Jubilant FoodWorks, G4S, Times Internet and NIIT Technologies, with a special focus on risk management, endpoint security, cloud security, application security and threat intelligence.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.