CYBERSECURITY

Cybersecurity: Why Cloud Usage Drives Spending Up

Cybersecurity: The rapid migration to cloud-based technologies is the most significant disruption to operations, worldwide and an important one.

  • Seventy-one percent of respondents see a need to increase spending on cloud security monitoring.
  • Fifty-three percent say that Cloud Access Security Broker (CASB) focuses on cloud-based tools.
  • Fifty-two percent want to increase spending on employee training.

“The SANS survey showed that the rapid transition of corporate services and business applications to cloud-based technology is the single largest factor breaking existing security architectures and driving most of the new cybersecurity spending,”.

“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats,”.

Cybersecurity: Increasing Spending On Cloud Monitoring

Slightly more than half of the respondents rated the increased use of Public Cloud Infrastructure-as-a-Service (IaaS) implementations as the most significant disruptive factor for security programs in the next twelve months. Based on this, 71 percent of respondents said they see a need to increase spending on cloud security monitoring, followed by cloud-specific tools for the security broker (53 percent), employee training (52 percent), and strong authentication (46 percent).

A total of 57 percent of those surveyed think that, in addition to processes (19 percent) and technology (18 percent), increased investment in people would bring the most significant improvement in their general safety posture. “Managers see educating and refreshing their existing workforce as much more important than simply increasing their workforce,”.

Cybersecurity: Improving Employee Skills

“The fact that respondents place significantly more emphasis on empowering employees than on increasing the number of employees to deal with disruptive technology, especially when faced with escalating privacy regulations and fines around the world, is not surprising. The business use of IaaS and hybrid cloud environments requires a reorganization of the security controls and the integration with CI / CD methods. “

In a series of follow-up interviews with selected respondents, the safety managers recognize the need for “higher qualification” to increase attendance rates, improving effectiveness and efficiency. A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased in 2020.

Cybersecurity: Damage From Security Breaches

Strong authentication, the fourth area of ​​planned spending, points to the realization that most of the damage from security breaches and ransom attacks over the past year was made possible by using reusable passwords that phishing attacks can easily assign capture. CEOs and boards of directors support the security teams in overcoming obstacles in the implementation of multi-factor authentication.

“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats, “A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased.

ALSO READ: Corporate IT: Four Essential Fields Of Action In 2021

Techno Rumours

Technorumours.com is an internationally renowned website that publishes tech-based content exclusively. We are a team of dedicated and passionate souls who thrive to provide innovative content on the technology niche to our global audience.

Recent Posts

What Google Threat Horizons Suggests To Businesses Using The Cloud

The Google Threat Horizons report is a document that should be consulted by those involved…

2 months ago

Julius AI, The New Artificial Intelligence For Data Analysis

Julius computer-based intelligence is an artificial brainpower ideal for investigating information from Succeed. An instrument…

5 months ago

CA Technologies: Businesses Enter The Era Of The Software Economy

For CA Technologies, agility, DevOps, feedback, and security constitute the strategic pillars of business development.…

6 months ago

From Hybrid Cloud To Multi Cloud: The Three Steps To Take

The migration from hybrid Cloud to multi-cloud is of interest to the vast majority of…

7 months ago

The New Digital Marketing Professions: What You Need To Know

The Internet has made the world an actual global village. Its advent broke down physical,…

8 months ago

When Should We Post On Social Media In 2024?

With the blast in the notoriety of virtual entertainment, it is progressively challenging for a…

8 months ago