Cybersecurity: The rapid migration to cloud-based technologies is the most significant disruption to operations, worldwide and an important one.
“The SANS survey showed that the rapid transition of corporate services and business applications to cloud-based technology is the single largest factor breaking existing security architectures and driving most of the new cybersecurity spending,”.
“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats,”.
Slightly more than half of the respondents rated the increased use of Public Cloud Infrastructure-as-a-Service (IaaS) implementations as the most significant disruptive factor for security programs in the next twelve months. Based on this, 71 percent of respondents said they see a need to increase spending on cloud security monitoring, followed by cloud-specific tools for the security broker (53 percent), employee training (52 percent), and strong authentication (46 percent).
A total of 57 percent of those surveyed think that, in addition to processes (19 percent) and technology (18 percent), increased investment in people would bring the most significant improvement in their general safety posture. “Managers see educating and refreshing their existing workforce as much more important than simply increasing their workforce,”.
“The fact that respondents place significantly more emphasis on empowering employees than on increasing the number of employees to deal with disruptive technology, especially when faced with escalating privacy regulations and fines around the world, is not surprising. The business use of IaaS and hybrid cloud environments requires a reorganization of the security controls and the integration with CI / CD methods. “
In a series of follow-up interviews with selected respondents, the safety managers recognize the need for “higher qualification” to increase attendance rates, improving effectiveness and efficiency. A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased in 2020.
Strong authentication, the fourth area of planned spending, points to the realization that most of the damage from security breaches and ransom attacks over the past year was made possible by using reusable passwords that phishing attacks can easily assign capture. CEOs and boards of directors support the security teams in overcoming obstacles in the implementation of multi-factor authentication.
“Cloud surveillance and cloud security access control were the top two spending areas, followed by those on increasing the security staff’s ability to deal with new technologies such as the cloud and to keep pace with regulatory changes and new threats, “A higher level of qualification in new technologies and new security techniques is also required to enable the use of security automation techniques that were not mentioned particularly often when spending increased.
ALSO READ: Corporate IT: Four Essential Fields Of Action In 2021
The Google Threat Horizons report is a document that should be consulted by those involved…
Julius computer-based intelligence is an artificial brainpower ideal for investigating information from Succeed. An instrument…
For CA Technologies, agility, DevOps, feedback, and security constitute the strategic pillars of business development.…
The migration from hybrid Cloud to multi-cloud is of interest to the vast majority of…
The Internet has made the world an actual global village. Its advent broke down physical,…
With the blast in the notoriety of virtual entertainment, it is progressively challenging for a…