Page 11 - Cloudsecurity Magazine - Digitaltech Media
P. 11

Thus, it does not matter                                                               Palmer, on the other
          where the infrastructure                                                            hand, believes that while
          or applications reside,                                                             the threat landscape
          because if they are                                                                 has evolved, security
          connected, they are                                                                 solutions failed to keep      TRENDING STORY
          potentially vulnerable.                                                             up, creating a massive
          Organizational heads                                                                gap in the ability of
          need to understand                                                                  the organization to
          this and implement                                                                  understand their cyber
          cybersecurity strategies                                                            exposure.
          that address new and                                                                   “Cyber exposure gap
          emerging threats.                                                                   has left organizations
             “Stay-at-home                                                                    vulnerable and exposed.
          orders pushed many                                                                  Enterprises need to
          organizations to                                                                    think strategically about
          leverage new cloud-                                                                 their security programs,
          based technologies and                                                              ensuring that they are
          approaches to optimize      aDam PalmeR,                                            investing in the right
          their performance.                                                                  solutions and tools
          But, as with any new        Chief Cybersecurity Strategist, Tenable                 to tackle modern IT
          technology, it expands                                                              challenges. The right
          the attack surface,            Typically, when          the sustainability of the   security solutions can
          and there have been         companies migrate to        business. With hackers      help security teams
          reports of cybercriminals   the cloud, they focus       getting creative and        eliminate blindspots
          targeting users in a        primarily on the cloud      more aggressive with        and gain unparalleled
          variety of ways, including  infrastructure, rather      their techniques, they      visibility into the security
          leveraging malicious        than cloud security,        can take advantage of a     status of their modern
          emails to phish users and  which is often an            slight breach and steal     IT infrastructure,” he
          spread digital viruses.     afterthought for them.      sensitive information and  added.
          Organizations will have     Given the existing threat   data,” says Mukherjee.
          to rethink business         landscape, different           Thus, cloud security     Managing and
          models that align with      layers within the cloud     needs to be prioritized     Monitoring the
          new working patterns,       need safeguarding. In       by all the organizations
          customer demand, and        other words, it is crucial   moving to the cloud to     Cloud Infrastructure
          supply arrangements.        to protect email, data,     protect them against the  Successfully
          Security teams will have    and user credentials from  spike in the number of          In the wake of
          to re-establish effective   advanced threats while      phishing attacks through  increased cloud
          controls over a new         ensuring compliance in      malicious links and apps    adoption and mounting
          hybrid home and office      the cloud.                  that hack devices, as       security threats, how
          working model,” Palmer         “Cloud is useful         well as steal user data.    can companies better
          reiterated.                 for businesses due          As far as cloud security    manage and monitor the
                                      to its flexibility and      is concerned, it offers     cloud infrastructure?
          How Can Cloud               remote access, which        many benefits, such as         Well, to begin with,
          Security Help Despite       is attractive in today’s    visibility, next-gen email   organizations must
                                                                  security, advanced threat  acquire a complete
          the Evolving Threat         business environment.       protection, data security,  picture of their cyber risk
                                      It is useful but is not
          Landscape?                  risk-free and is critical to   and compliance.          with unified visibility into



                                                                                                           SEPTEMBER 2020
                                                                                                           SEPTEMBER 2020  11
   6   7   8   9   10   11   12   13   14   15   16