Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. Act on cloud predictions.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Cloud computing has proven battle-ready. During COVID-19, cloud demonstrated it can support unplanned and unexpected needs. Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. Secure access service edge.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

Cloud is big business today. Forrester estimates that global cloud services revenues totaled $114 billion in 2016, up from $68 billion just two years ago -- that's annual growth of 30%. And we see the public cloud services market reaching $236 billion by 2020. What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Cloud Security. cloud.

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility. Vulnerabilities: 24 percent of organizations have hosts missing high-severity patches in the public cloud. More than three-fourths of security breaches (80%) involve privileged credentials. What is cloud computing?

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

CSPM Vs. CIEM: Demystifying Two Popular Cloud Security Acronyms

CTOvision

Read Shai Morag explain the difference between cloud security posture management (CSPM) and cloud infrastructure entitlements management (CIEM) on Forbes: The growing migration, in virtually every industry, of enterprise IT […].

Five critical cloud security challenges and how to overcome them

CTOvision

Read Chris Foster list five critical cloud security challenges and how to overcome them on Help Net Security : Today’s organizations desire the accessibility and flexibility of the cloud, yet […].

.Net 238

Gartner Top Security Projects for 2020-2021

CEB IT

“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

Securing connections in the cloud and across IoT devices

CTOvision

Read Jonathan Nguyen-Duy take a look at security threats to cloud and Internet of Things devices on Intelligent CIO : The hyper-connected, global marketplace of the 21st century has shifted […].

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Their solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Cloud Computing Companies Company Security Companies Security Scanning And Testing

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

Cloud security secrets your cloud provider doesn't want you to know

David Linthicum

The first question most cloud security architects ask when tasked with designing a cloud security solution is: What cloud are you using? Cloud-native security solutions offered by the big providers are not helpful if you have a heterogeneous multicloud solution.

Cloud 304

Making the case for cloud-based security

CTOvision

Read why Aaron Tan says that companies should embrace cloud based security options on Computer Weekly: The pace at which threat actors are carrying out cyber attacks has been accelerating […].

Cloud Security Risks Rise During the Coronavirus Pandemic: Survey

CTOvision

As several organizations are forced to shift to work from home to curb the spread of COVID-19, IT and cloud security professionals are concerned about the security of their cloud environments, according to the “State of Cloud Security” survey conducted by Fugue.

Survey 238

How can vendors and end users ensure cloud security?

CTOvision

As rates of cloud adoption surge, in part due to the Covid-19 pandemic, Nick Ismail takes a look at how can organizations, and vendors ensure cloud security on Information Age: […].

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. The next step in cloud computing. | Keep up with the latest developments in cloud computing with InfoWorld’s Cloud Computing newsletter. ]. These IAM tools are either native to the public cloud platform or come from a third party.

Google Cloud secures U.S. military AI cancer research contract

Venture Beast

Google Cloud will provide AI for cancer diagnosis research and augmented reality microscopes to Veterans Affairs hospitals as part of a new contract.

Google 106

3 cloud security 'hacks' to consider today

David Linthicum

Are you the cloud security person, or cloudsec/cloudops, as it’s often called? The person who controls the cloud deployment, including all security such as IAM (identity and access management), encryption services, and application and user authentication? I have some observations about cloud security to share. First, enterprises typically don’t have a good-fitting security solution.

Demonstrating Scientific Data Integrity and Security in the Cloud

CTOvision

Read Damian Tiller take a look at the scientific data integrity and security in the cloud on Infosec Magazine: Companies in the life sciences space often generate loads of data—that […].

Security teams struggle to keep pace with cloud threats

CTOvision

Misconfiguration, unauthorised access and account hijacking are the most pressing of a number of threats to public cloud environments, which are now reaching a level where security operations are finding […].

The Top 10 Cloud Myths

CEB IT

Myths continue to plague cloud computing. Although cloud computing has become much more mainstream in the last five years, some of the myths that circulated during its advent still persist today. Cloud should be thought of as a means to an end. 1: Cloud is always about money.

Cloud 310

CipherCloud: New approaches to cloud security

CTOvision

CipherCloud has a very unique approach to enhancing security of enterprise data in the cloud. CipherCloud is a pioneer in delivering cloud information protection and enabling you to overcome risks to data privacy, residency, security, and regulatory compliance and deliver better business results. The post CipherCloud: New approaches to cloud security appeared first on CTOvision.com. Cloud Computing Company Security Companies ciphercloud

6 Steps to Securing Production File Data in the Cloud

CTOvision

Read Russ Kennedy list six ways in which you can secure production file data in the cloud on Security Boulevard : Unstructured file data is the fastest-growing segment of enterprise […].

Moving security operations to the cloud

CTOvision

Read Jon Oltsik explain how to move your security operations to the cloud on CSO Online : It’s also important to remember that these security operations challenges are exacerbated by the ongoing cybersecurity skills shortage as there just aren’t enough skilled bodies to throw at problems. Looking to get off this security operations treadmill, many organizations […].

Break down those cloud security silos

David Linthicum

Do you have good cloud security? The group quickly picked and installed a cloud security solution that worked well for those applications and data stores, or that they considered best of breed. Now add other sprints, other workloads and data stores, along with best-of-breed security solutions, all seemingly effective. We’re building security silos without realizing it.

Four Cloud Security Concerns (and How to Address Them)

CTOvision

Read Matthew Chiodi list top four cloud security concerns and how to address them on Palo Alto Networks Blog : The cloud can be overwhelming. Cyber Security NewsCounter to the structured and disciplined rigor of old-school, waterfall, data-center-centric application development, there’s code being deployed in a nearly continuous fashion. Traditional servers are history. Penetration tests are so […].

Managing Security Risks in the Cloud

CTOvision

Read Daniel Smith explain how companies can manage security risks in the cloud on Security Boulevard : Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. Cyber Security News

Alert Logic: Cloud Security as a Service

CTOvision

Alert Logic is widely known as an a provider of managed security services which can provide continuous monitoring and response managed by experts for firms using cloud, on-prem or hybrid architectures. Managed Services, Outsourced Security Alert Logic

Cloud Security Alliance Federal Summit 5 May in DC

CTOvision

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure and highly functional cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products.

Sorry, cloud resisters: Control does not equal security

David Linthicum

Cloud Computing Security Cloud Security Do you remember last Christmas? Target lost data from about 40 million credit and debit cards that were stolen at its stores between Nov. 27 and Dec. 15, the height of the holiday shopping period. Thieves tampered with the sales terminals'' card swipers to gain access to the data stored on the magnetic stripe on the back of credit and debit cards. read more.

More reasons to put secure data in the public cloud

David Linthicum

The worldwide market for cloud intrusion protection software is projected to grow by $1.8 This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud. What’s the risk in leaving the data where it is, versus moving it to a public cloud? IDG Research: The state of the cloud: How enterprise adoption is taking shape.

Connected Devices, Remote Security: Data Encryption and Security in the Cloud

CTOvision

Security” used to mean worrying about HTTPS certificates on your websites. Cloud Computing CTO Cyber Security NewsThe notion of a “device” was a browser and all you really had to do was to guarantee that traffic between it and your web servers was encrypted. Then the “bring your own device” (BYOD) phenomenon caused system administrators to worry about things like […].

Unlock the next level of cloud security

David Linthicum

I’m often asked about cloud security best practices, and my answer is always the same: It depends on what you want to protect in the cloud. Indeed, the security services you’ll find in the cloud are about as good as they get in IT. After all, we’ve yet to see a major attack in a public cloud. Discover how to secure your systems with InfoWorld's Security newsletter. ].

How the cloud has made you more secure

David Linthicum

Wow, we are near to having 20 percent of our enterprise workloads in the cloud and the world has not collapsed around us—despite such predictions even just three years ago. One of the big fears was over security. But your information is actually safer in the cloud than it is in your own data center. IDG Research: The state of the cloud: How enterprise adoption is taking shape. Cloud providers have invested substantially in security.

Focus on cloud security integration between silos

David Linthicum

Do you have good cloud security? The group quickly picked and installed a cloud security solution that worked well for those applications and data stores, or that they considered best of breed. Now add other sprints, other workloads and data stores, along with best-of-breed security solutions, all seemingly effective. We’re building security silos without realizing it.

Understanding the Security Risks of New Cloud Software

CTOvision

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. Cloud services are generally pay-as-you-go solutions that offer flexibility and are scalable to business growth. With rising competition among cloud providers, customers benefit from falling prices and improving services. Modern cloud landscapes face inevitably more sophisticated attacks.

In the PR war over security, the cloud is losing

David Linthicum

As Computerworld reported , a panel at the RSA Security Conference last week agreed that, if cloud providers are vetted properly, most enterprise workloads and data are safe with those providers. This flies in the face of the common wisdom that cloud computing is inherently less secure and, thus, not a good fit when security and privacy are priorities. Cloud Computing Security Cloud Security

How to get the most cloud security

David Linthicum

Infact, you can reduce your risk more this way than with just the use of modern cloud security software and best security practices. What is cloud computing? Also: InfoWorld helps you identify the right tools for the job: AWS cloud services guide • Microsoft Azure services guide. Google Cloud Platform services guide. ]. Unfortunately, most companies just try to toss technology at security problems.

Secure Enclaves: Foundation For The Cloud-Based Enterprise

CTOvision

This is the first in a series of blog posts examining a cloud-based enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a cloud-based model. The two dominant themes in enterprise architecture today is the desire to save money by utilizing cloud services and threat of state-sponsored cyberattacks. Cloud Computing CTO Cyber Security News AWS information technology public clouds

How New Security and Encryption Layers Strengthen Cloud Databases

CTOvision

Read Pierre-Yves Lanneau Saint Leger explain how new security and encryption layers will strengthen cloud databases on Toolbox : Protecting database management systems in the cloud is becoming steadily more difficult. While hackers have breached cloud-based systems that store and retrieve data […].

System 183

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. However, responding to COVID-19 remains the biggest challenge for most security organizations in 2020. The primary goals of an XDR solution are to increase detection accuracy and improve security operations efficiency and productivity.

Trends 239

Update on Cloud Access Security Brokers (CASB)

CTOvision

Cloud Access Security Brokers (CASB) have been hot for the last 5 years. This makes sense, since any successful cloud transition strategy should including appropriate attention being placed on how to secure, control and […]. CTO Cyber Security NewsIt has gotten to the point where every firm is either using one, evaluating one, or studying how to use them.

Hacking The Cloud: Kubernetes’ first major security hole discovered

CTOvision

Kubernetes has become the most popular cloud container orchestration system by far, so it was only a matter of time until its first major security hole was discovered. critical security hole. CTO Cyber Security NewsAnd the bug, CVE-2018-1002105, aka the Kubernetes privilege escalation flaw, is a doozy. It’s a CVSS 9.8 With a specially crafted network request, any user […].