Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Threat Intelligence Maintains Cybersecurity in a Multi-Cloud Environment
Cybersecurity Minute

How Threat Intelligence Maintains Cybersecurity in a Multi-Cloud Environment

Frank DomizioBy Frank DomizioApril 20, 2023Updated:April 20, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 81 of the Cybersecurity Minute, practitioner analyst Frank Domizio talks about threat intelligence and its value in a multi-cloud environment.

To hear practitioner and platform insights on how solutions such as ChatGPT will impact the future of work, customer experience, data strategy, and cybersecurity, make sure to register for your on-demand pass to Acceleration Economy’s Generative AI Digital Summit.

Highlights

00:56 — Cloud’s benefits are well known and well understood: scalability, flexibility, cost savings.

01:12 — Since it’s constantly changing and evolving, the cloud can create vulnerabilties and hackers will try to exploit them. That’s where threat intelligence comes in: it’s all about gathering and analyzing information to identify potential cybersecurity threats before they become actual threats.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

01:31 — In the cloud, threat intelligence is crucial to keep everything locked down and secure; if we apply that tinking to a supply chain attack similar to the Solar Winds incident, we can see how threat intelligence can help.

01:44 — Threat intel platforms can track the security posture of vendors and suppliers to identify potential vulnerabilities and flag suspicious activity by identifying and addressing these risks in our vendor ecosystem so we could prevent a supply chain attack or prevent one from spreading.

Securing Multi-Cloud Ecosystems Guidebook
Guidebook: Securing Multi-Cloud Ecosystems Guidebook

02:18 — Threat intelligence really shines in a multi-cloud environment by monitoring and analyzing all the different cloud environments and can help identify potential risks and vulnerabilities across the entire multi-cloud. This makes it easier to respond to incidents quickly, keeping your data and customers safe from threats.

Cloud Cybersecurity featured multi-cloud
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

OpenAI and Oracle to Support Stargate UAE, Massive AI Infrastructure Expansion

May 28, 2025

Microsoft Accelerates AI Development with New Azure AI Foundry, GitHub Services at Build 2025

May 28, 2025

Workday Urges Digital Transformation as Legacy HR Systems Drain U.S. Tax Dollars

May 28, 2025

Workday Leads the Future of AI Agent Management and Workforce Transformation | Cloud Wars Live

May 27, 2025
Add A Comment

Comments are closed.

Recent Posts
  • OpenAI and Oracle to Support Stargate UAE, Massive AI Infrastructure Expansion
  • Microsoft Accelerates AI Development with New Azure AI Foundry, GitHub Services at Build 2025
  • Workday Urges Digital Transformation as Legacy HR Systems Drain U.S. Tax Dollars
  • Workday Leads the Future of AI Agent Management and Workforce Transformation | Cloud Wars Live
  • How SAP Uses AI for Insights, Growth, Speed: COO Sebastian Steinhaeuser

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.