Todays Cloud Security Featured

Todays Cloud Security

Enterprise cloud security is making real progress, however emerging technologies call for security teams to keep up with changes.

The state of cloud security is improving — or, at the very least, it isn't backsliding. But as cloud technology grows more prevalent and more complicated, security teams are going to need to keep innovating with improved controls and integrations.

So say the experts with SANS Institute, which just put together its first comprehensive review of cloud security practices since 2017. On a positive note, SANS analyst and instructor Dave Shackleford says responses show that cloud security stances are improving.

"The news was not all doom and gloom. I was pretty excited by some of the results that came back this year because there are some shifts happening that tell me the security industry is really starting to step up," Shackleford says.

Advertisement

Nevertheless, increased penetration of the cloud, increasing attacker awareness of expanding opportunities to target cloud resources, and the acceleration of use of new cloud technologies are all making it tough to rest on those laurels.

"The attackers have figured out that there's a lot of cloud surface area to approach and attack," Shackleford explains. "At the same time, we've got people trying to make use of new platforms and new technologies within those platforms — things like Kubernetes, S3 buckets, and so forth."

As a result, the survey shows a big uptick in unauthorized access by outsiders into cloud environments and assets — impacting 31% of organizations so far this year compared with 19% two years ago. The good news is that while organizations are still struggling to gain visibility into cloud environments, that situation has improved. Whereas in 2017 55% of organizations complained they were frustrated by trying to get low-level logs and systems information for forensics, that has decreased to 30% of organizations today.

Advertisement

#cybersecurity

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

back to top

Popular Cyber News

Top Tips to Protect Your Business Against Social Media Mistakes

Top Tips to Protect Your Business Against Social Media Mistakes

11 May, 2019

Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or ...

Study Shows Extent of Cyber Risk

Study Shows Extent of Cyber Risk

10 May, 2019

A new study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well. ...

How to Secure your Azure Storage accounts

How to Secure your Azure Storage accounts

14 May, 2019

Enterprise data is growing exponentially and becoming more complicated, making it harder to manage, and an even bigger c...

Vodafone is Challenging Huawei Report of Telnet 'Backdoor'

Vodafone is Challenging Huawei Report of Telnet 'Backdoor'

01 May, 2019

Vodafone is challenging a Bloomberg report that security vulnerabilities and backdoors within Huawei networking equipmen...

Malware: Doesn't need to be new to cause serious damage

Malware: Doesn't need to be new to cause serious damage

05 May, 2019

The good news is: The development of new malware exploits has slowed significantly.

Microsoft adds Plug and Play to IoT

Microsoft adds Plug and Play to IoT

03 May, 2019

Microsoft just announced that it wants to add the advantages of Plug and Play, which allows you to plug virtually any pe...

Twitch streamers take action to secure their accounts against hacks

Twitch streamers take action to secure their accounts against hacks

30 April, 2019

Twitch has an account hacking problem.

Over 22 billion IoT devices are out there

Over 22 billion IoT devices are out there

20 May, 2019

Enterprise Internet of Things (IoT) remains the leading segment, accounting for more than half of the market, with mobil...

Lessons learnt from cyber attacks

Lessons learnt from cyber attacks

07 May, 2019

Communication about cyber attacks emerged as another key theme in the panel discussion. The SingHealth data breach under...

Categories

Home Tech Reviews UK

Mobile Tech Reviews UK

×

Sign up to keep in touch!

Be the first to hear th latest Cyber and Tech News straight to your mailbox.

Check out our Privacy Policy & Terms of use
You can unsubscribe from email list at any time