An IT security game changer

The clock is ticking: while Fortune 500 companies detect a serious vulnerability every 12 hours, it takes attackers less than 45 minutes to do the same as they scan the size of the internet. for weak business assets.

To make matters worse, bad artists are multiplying, skilled IT professionals are a scarce resource, and the need for non-contact interactions, remote work arrangements, and agile business processes continue to expand in cloud environments. Everyone puts the risk of attacking an organization-the total number of hackers that can find-at risk.

“We’ve seen a steady stream of attacks in various sectors, such as healthcare, transportation, food supply, and shipping,” said Gene Spafford, a computer science professor at Purdue University. “As each of this happens, the awareness of cybersecurity rises. People don’t look at themselves as victims until something happens to them – that’s a problem. It’s not taken seriously. which is such a high system threat. ”

Organizations need to know where the critical penetration points are in their information technology (IT) environments and how they can minimize their attack in the upper area in an intelligent, data-driven manner. method. Digital assets are not the only things at risk. An organization’s business reputation, customer loyalty, and financial stability are all in the balance posture of a company’s cybersecurity.

To better understand the challenges security teams currently face and the strategies they need to adopt to protect their companies, MIT Technology Review Insights and Palo Alto conducted a global survey of 728 business leaders. Their responses, combined with the input of industry experts, provide a critical framework for guarding systems against a growing battalion of bad artists and quick threats.

Weaknesses in a cloud environment

The cloud continues to play a critical role in accelerating digital change-and with good reason: the cloud offers many benefits, including increased speed, great cost savings, and more. kadako. Although cloud -based issues account for 79% of the observed disclosures compared to 21% for assets in place, according to the “2021 Cortex Xpanse Attack Surface Threat Report.”

“The cloud is just a company’s computer and storage resources,” said Richard Forno, director of the graduate cybersecurity program at the University of Maryland, Baltimore County. “Right there, highlighting the security and privacy problems of companies of all sizes.”

Even more so: 49% of survey respondents report that more than half of their assets will be in the public cloud by 2021. “Ninety -five percent of our business applications will be in the cloud, including CRM, Salesforce, and NetSuite, ”said Noam Lang, senior director of information security at Imperva, a cybersecurity software company, which focuses on popular subscription -based applications that handle customer relationship management . But while “the cloud provides more flexibility and rapid growth,” Lang added, “it also presents a major security challenge.”

Part of the problem is the unparalleled speed at which IT teams can run cloud servers. “The cadence we work with in the cloud makes it even more challenging, from a security perspective, to keep track of all the security upgrades that are needed,” Lang said.

For example, Lang said, in the past, deploying servers in the area were known to be time-wasting tasks, including a lengthy purchasing process, deployment activities, and configuration. on firewalls. “Just imagine what time it allows our security teams to prepare for the new servers,” he said. “From the moment we decide to add our infrastructure, it will take weeks or months before we implement any servers. But in today’s universe, it only takes five minutes to change the code. We’re allowed to. that it is easier to move the business, but it also introduces new risks. ”

Download full report.

Its content was created by Insights, the standard MIT Technology Review content. It was not written by the editorial staff of the MIT Technology Review.

Source link


Leave a Reply

Your email address will not be published. Required fields are marked *