Page 11 - Cloudsecurity Magazine - Digitaltech Media
P. 11
Thus, it does not matter Palmer, on the other
where the infrastructure hand, believes that while
or applications reside, the threat landscape
because if they are has evolved, security
connected, they are solutions failed to keep TRENDING STORY
potentially vulnerable. up, creating a massive
Organizational heads gap in the ability of
need to understand the organization to
this and implement understand their cyber
cybersecurity strategies exposure.
that address new and “Cyber exposure gap
emerging threats. has left organizations
“Stay-at-home vulnerable and exposed.
orders pushed many Enterprises need to
organizations to think strategically about
leverage new cloud- their security programs,
based technologies and ensuring that they are
approaches to optimize aDam PalmeR, investing in the right
their performance. solutions and tools
But, as with any new Chief Cybersecurity Strategist, Tenable to tackle modern IT
technology, it expands challenges. The right
the attack surface, Typically, when the sustainability of the security solutions can
and there have been companies migrate to business. With hackers help security teams
reports of cybercriminals the cloud, they focus getting creative and eliminate blindspots
targeting users in a primarily on the cloud more aggressive with and gain unparalleled
variety of ways, including infrastructure, rather their techniques, they visibility into the security
leveraging malicious than cloud security, can take advantage of a status of their modern
emails to phish users and which is often an slight breach and steal IT infrastructure,” he
spread digital viruses. afterthought for them. sensitive information and added.
Organizations will have Given the existing threat data,” says Mukherjee.
to rethink business landscape, different Thus, cloud security Managing and
models that align with layers within the cloud needs to be prioritized Monitoring the
new working patterns, need safeguarding. In by all the organizations
customer demand, and other words, it is crucial moving to the cloud to Cloud Infrastructure
supply arrangements. to protect email, data, protect them against the Successfully
Security teams will have and user credentials from spike in the number of In the wake of
to re-establish effective advanced threats while phishing attacks through increased cloud
controls over a new ensuring compliance in malicious links and apps adoption and mounting
hybrid home and office the cloud. that hack devices, as security threats, how
working model,” Palmer “Cloud is useful well as steal user data. can companies better
reiterated. for businesses due As far as cloud security manage and monitor the
to its flexibility and is concerned, it offers cloud infrastructure?
How Can Cloud remote access, which many benefits, such as Well, to begin with,
Security Help Despite is attractive in today’s visibility, next-gen email organizations must
security, advanced threat acquire a complete
the Evolving Threat business environment. protection, data security, picture of their cyber risk
It is useful but is not
Landscape? risk-free and is critical to and compliance. with unified visibility into
SEPTEMBER 2020
SEPTEMBER 2020 11