Cloud Adoption on the Rise, IT Pros Unsure of Risk

Infosecurity Magazine | March 01, 2019

Cloud Adoption on the Rise, IT Pros Unsure of Risk
Even though misconfigurations in public clouds create risks to enterprise security, a new study found that more than half of IT professionals do not really understand the risks inherent in public cloud misconfigurations as well as they understand risks within their traditional IT environments. The 2019 State of Enterprise Cloud and Container Adoption and Security report published by DivvyCloud found that despite the reality that cloud adoption is on the rise, IT professionals are unaware of the security risks associated with their organizations’ adoption of cloud and container services. In fact, less than half of participants could accurately identify that the risk of misconfiguration in public cloud is higher than the risk in traditional IT environments, the study found. The survey of nearly 2,000 enterprise and IT professionals found that on average, 40% of organizations are running their workloads in the public cloud, with 89%t stating that they are either in various stages of cloud implementation or have plans to adopt public cloud within the next year.

Spotlight

Scopri di più sul monitoraggio delle nuove applicazioni e sui rispettivi fondamenti per assicurare che i servizi digitali offrano prestazioni all'altezza delle aspettative dei clienti. Questo report di Forrester illustra come usare l'evoluzione dell'intelligenza artificiale per le operazioni IT (AIOps) per unificare i dati rilevanti, associare l'intelligence all'automazione, quantificare l'impatto dei problemi e ispirare fiducia con un servizio a disponibilità elevata.

Ottieni questo report per scoprire due percorsi di soluzione possibili per incorporare l'intelligenza artificiale nelle operazioni IT e stabilire quale sia il percorso ottimale per la tua organizzazione:

  • Usa un singolo sistema per operazioni intelligenti per sostituire la maggior parte dei diversi strumenti e sistemi.
  • Gestisci tutti i servizi digitali contemporaneamente con un overlay intelligente di strumenti per AIOps.

Spotlight

Scopri di più sul monitoraggio delle nuove applicazioni e sui rispettivi fondamenti per assicurare che i servizi digitali offrano prestazioni all'altezza delle aspettative dei clienti. Questo report di Forrester illustra come usare l'evoluzione dell'intelligenza artificiale per le operazioni IT (AIOps) per unificare i dati rilevanti, associare l'intelligence all'automazione, quantificare l'impatto dei problemi e ispirare fiducia con un servizio a disponibilità elevata.

Ottieni questo report per scoprire due percorsi di soluzione possibili per incorporare l'intelligenza artificiale nelle operazioni IT e stabilire quale sia il percorso ottimale per la tua organizzazione:

  • Usa un singolo sistema per operazioni intelligenti per sostituire la maggior parte dei diversi strumenti e sistemi.
  • Gestisci tutti i servizi digitali contemporaneamente con un overlay intelligente di strumenti per AIOps.

Related News

Cybersecurity Threats Posed by USB to Industrial OT Has Doubled, Finds Honeywell's USB Threat Report

Honeywell | July 09, 2020

In a report released today by Honeywell (NYSE: HON) based on cybersecurity threat data collected from hundreds of industrial facilities globally, the severity of threats detected to operational technology (OT) systems has risen by significant amounts over a 12-month period.The findings from the latest Honeywell Industrial USB Threat Report show that the total amount of threats posed by USB removable media to industrial process control networks remains consistently high, with 45% of locations detecting at least one inbound threat. Over the same time period, the number of threats specifically targeting OT systems nearly doubled from 16 to 28%, while the number of threats capable of causing a loss of view or other major disruption to OT systems more than doubled, from 26 to 59%.The report shows that 1 in 5 of all threats was designed specifically to leverage USB removable media as an attack vector, and more than half the threats were designed to open backdoors, establish persistent remote access or download additional malicious payloads. These findings are indicative of more coordinated attacks, likely attempting to target air-gapped systems used in most industrial control environments and critical infrastructure.

Read More

DATA SECURITY

Trend Micro Global Capture the Flag Winners Show Cybersecurity Excellence

prnewswire | December 21, 2020

Pattern Micro Incorporated , the pioneer in cloud security, today declared the victors of its worldwide Capture the Flag (CTF) rivalry, a yearly occasion that exhibits the absolute most noteworthy cybersecurity ability on the planet in a straight on fight. The previous year has prompted an exceptional degree of corporate computerized presence because of monetary and social movements identified with the COVID-19 pandemic. With this move comes an interest for expanded cybersecurity, the same number of associations around the globe have relocated quite a bit of their labor force on the web and their IT foundation to crossover cloud models. The CTF was planned by Trend Micro analysts to show true cybersecurity situations. Occasions like this fill in as a significant piece of Trend Micro's way to deal with tending to the cybersecurity abilities lack by rousing future ability and building a cybersecurity labor force devoted to securing an associated advanced world. "In a time where we can't be together in person, opportunities to unite under the common interest of guarding against cybercrime are increasingly important," said Mike Gibson, vice president of threat research for Trend Micro. "The excellent display of talent, competition, and comradery of this event bolsters Trend Micro's mission of making the world safe for securing digital information. In today's threat landscape, the success of any organization rests on its ability to remain agile while also achieving a high standard of security. With events like our Global CTF, it is our goal to train defenders to successfully navigate this landscape." While the challenge incorporates a virtual segment each year in the online qualifier, which occurred on October 3-4, this year a virtual last was held unexpectedly on December 19-20, 2020. Groups from across the globe contended in difficulties zeroed in on figuring out, legal sciences/misuse, open-source knowledge (OSINT), versatile, IoT, AI, and radio recurrence (RF) frameworks. RF was incorporated unexpectedly after a profoundly effective commitment with the cybersecurity network in isolated Capture the Signal occasions in the course of recent years. About Trend Micro Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers with connected solutions across cloud workloads, endpoints, email, IIoT, and networks. Our XGen™ security strategy powers our solutions with a cross-generational blend of threat-defense techniques that are optimized for key environments and leverage shared threat intelligence for better, faster protection. With over 6,700 employees in 65 countries, and the world's most advanced global threat research and intelligence, Trend Micro enables organizations to secure their connected world.

Read More

DATA SECURITY

F-Secure has Launched a Modular Platform for Cyber Security Servitization

F-Secure | May 20, 2021

Today, cybersecurity provider F-Secure launched F-Secure Elements: a replacement cloud-based platform that streamlines how organizations provide cybersecurity services. Available from F-Secure's service partners with fixed-term license subscriptions, or usage-based billing for greater flexibility, F-Secure Elements empowers organizations to select cybersecurity services on terms that accommodate their needs. Many organizations operate in complex environments dominated by a variety of dynamic risks and opportunities. Keeping these complexities in mind, also because of the rising costs of security and therefore the lack of experienced security professionals, it's no surprise that an awesome number of organizations want to simplify how they source cybersecurity capabilities. F-Secure Executive vice-chairman of Business Security Juha Kivikoski says these demands are driving a shift toward providing cybersecurity as services instead of products. "Even with updates, products are static and can't adapt fast enough to stay up with threats, or businesses, as they evolve. Services help businesses stay agile and are less expensive when delivered right, which is why the longer term of our industry is in delivering everything as a service," he explained. "Having a platform designed for the servitization of cybersecurity can help organizations recover protection, which is why simplicity and adaptability are F-Secure Elements' core design principles." F-Secure Elements may be a modular platform that mixes endpoint protection, endpoint detection and response, vulnerability management, and collaboration protection for cloud services (such as Microsoft Office 365). F-Secure Elements' key capabilities and benefits include: • Comprehensive situational awareness and meaningful visibility across assets, configurations, vulnerabilities, threats, and events. • Streamlined and autonomous operations to make sure efficient workflows and faster responses to real threats. • Real-time, connected data flow between elements to enable faster detection of threats. • Intelligent, extended detection and response capabilities for data-informed decisions. • On-demand choice to elevate difficult cases to F-Secure experts. About F-Secure Nobody has better visibility into real-life cyber attacks than F-Secure. We're closing the gap between detection and response, utilizing the unequaled threat intelligence of many of our industry's best technical consultants, many devices running our award-winning software, and ceaseless innovations in AI. Top banks, airlines, and enterprises trust our commitment to beating the world's most potent threats. alongside our network of the highest channel partners and over 200 service providers, we're on a mission to form sure everyone has the enterprise-grade cybersecurity we all need.

Read More