• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Cloud security: Increased concern about risks from partners, suppliers
Security

Cloud security: Increased concern about risks from partners, suppliers

August 19, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
VMware introduces cloud workload protection for AWS
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


There’s an ever-increasing push to the cloud.

This comes with growing risks from partners, suppliers and third parties, vulnerabilities and misconfigurations that can be compromised in any number of ways, and complex software supply chains and infrastructures that complicate remediation. 

But, while enterprises are concerned about all these implications, many have yet to implement advanced cloud security and data loss prevention (DLP) tools, according to a report released this week by Proofpoint, Inc., in collaboration with the Cloud Security Alliance (CSA).

Hillary Baron, a research analyst at CSA and the report’s lead author, pointed to the rush toward digital transformation amidst COVID-19. While this facilitated remote work and kept businesses up and running, there were unintended consequences and challenges due to large-scale — and hastily implemented — structural changes. 

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

“One of those challenges is developing a cohesive approach to cloud and web threats while managing legacy and on-premise security infrastructure,” said Baron. 

Increased concerns in complex landscapes

“Cloud and Web Security Challenges in 2022” queried more than 950 IT and security professionals representing various industries and organizational sizes. 

Notably, 81% of respondents said they are moderately to highly concerned about risks surrounding suppliers and partners, and 48% are specifically concerned about potential data loss as the result of such risks. 

See also  Verizon’s 2021 DBIR: Phishing and ransomware threats looming ever larger

It seems a warranted concern, study authors point out: 58% of respondent organizations indicated that third parties and suppliers were the target of cloud-based breaches in 2021.

Also troubling, 43% of respondents said that protecting customer data was their primary cloud and web security objective for 2022 — yet just 36% had dedicated DLP solutions in place. 

Also from the report: 

  • A majority of respondents were highly concerned (33%) or moderately concerned (48%) with security when collaborating with suppliers and partners. 
  • 47% said that legacy systems were a key challenge in improving their cloud security posture.
  • 37% said they need to coach more secure employee behavior. 
  • 47% said they had implemented endpoint security, 43% said they had implemented identity management solutions, and 38% said they had implemented privileged access management.

Meanwhile, organizations are concerned that targeted cloud applications either contain or provide access to data such as email (36%), authentication (37%), storage/file sharing (35%), customer relationship management (33%), and enterprise business intelligence (30%).

Experts and organizations alike agree that there’s much room for improvement in existing processes for managing third-party systems and integrations. 

Context is often lacking for software-as-a-service (SaaS) platforms in use — the data they hold, the integrations they facilitate, the access models in place, said Boris Gorin, cofounder and CEO of Canonic Security.

Also, these aren’t continuously monitored. He advised organizations to ask themselves whether they have an inventory of all third-party integrations and add-ons, and what access and reach these integrations have in their environments — or if they are active at all. 

See also  Why more orgs are moving away from the big 3 public cloud vendors 

“Most breaches happen because we didn’t execute on a policy, not because we didn’t have one,” said Gorin. Controls are overlooked, thus creating vulnerabilities. 

Dave Burton, chief marketing officer at Dig Security, also noted that there are many unaddressed uncertainties around cloud complexity that make it difficult for enterprises to understand exactly where cloud data is stored, how it is used, whether it includes sensitive information and if it is protected. 

Organizations must understand all of their data stores, ensure that they have backup capabilities in place, regularly perform software updates and implement the right tooling, he said. Tools such as DLP and data security posture management (DSPM) are also essential. 

Strategic practices, culture shifts

Another of the many byproducts of cloud technology adoption is the loss of governance, said Shira Shamban, CEO at Solvo. Also, too often, sensitive data is found in places where it shouldn’t be and is not appropriately secured. 

Ultimately, it’s not realistic to not store data in the cloud, he acknowledged, but organizations must only do so in cases where it is absolutely necessary — not just arbitrarily. Access must also be distinctly specified and limited.

Also, critically: “security cannot be just a yearly audit,” said Shamban. “It’s an ongoing process that consists of frequent auditing, validating and updating — much like cloud applications themselves.”

Similarly, the best tools are only effective when coupled with a culture of security within and around an organization, said Mayank Choudhary, EVP and GM for information protection, cloud security and compliance, at Proofpoint. 

See also  Behind Google Worker Protests of an Israeli Government Cloud Deal

“As organizations adopt cloud infrastructures to support their remote and hybrid work environments, they must not forget that people are the new perimeter,” he said. “It is an organization’s responsibility to properly train and educate employees and stakeholders on how to identify, resist and report attacks before damage is done.”

Source link

Cloud concern increased partners risks security suppliers
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Bitdefender Total Security review

March 6, 2024

Avast Premium Security review

March 6, 2024

Eset Home Security Ultimate review

January 23, 2024

AVG Internet Security review

October 31, 2023
Add A Comment

Comments are closed.

Editors Picks

Amazon Prime Subscribers Can Now Get a Free Year of Grubhub+ Deliveries (This Is How to Claim the Offer)

July 8, 2022

MSI Stealth 15M review: Coasting on its good looks

October 7, 2022

SATA Cables Can Leak Information From Air-Gapped Techniques

July 21, 2022

The Startup Building A Global Business In The Branded Toys Sector

January 17, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.