Survey Surfaces Raft of Cloud Security Challenges

A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments.
Conducted by Aviatrix, a provider of a cloud firewall, the survey found 37% are relying on native services from cloud service providers, while less than a quarter are using third-party solutions built for the cloud.
Only 42% strongly agreed that their organization's approach to cloud security is achieving its objectives.
The survey also noted nearly half of cloud network outages were caused by human error.
Firewalls were found to more often to be the cause of such an outage than a cyberattack, the survey finds.
Overall, the survey identifies a lack of in-house skills, followed by budget constraints, lack of training, interoperability between cloud service providers and security concerns as the biggest obstacles to cloud computing.
Only just over a third are very confident they know of every instance of cloud computing their organization employs and a similar number have incurred unexpected cloud networking costs.
Implementing cost controls and visibility and troubleshooting in terms of time and effort spent as being tied at 45% for the biggest hurdles IT teams face, the survey also finds.
Nearly two-thirds also struggle to hire the necessary candidates to support cloud initiatives, with slightly more also struggling to find educational resources to learn skills such as cloud platform expertise security, multi-cloud network architecture and design.
Rod Stuhlmuller, vice president of solutions marketing for Aviatrix, said the survey makes it clear the complexity of cloud computing environments remains a major challenge, an issue generative artificial intelligence projects are about to further exacerbate.
The survey finds 30% already reported they have increased plans to invest in cloud computing because of AI initiatives.
Stuhlmuller noted that as more workloads are deployed on the cloud, many IT organizations will need to revisit everything from application development and deployment to security.
Aviatrix, for example, is making a case for a Distributed Cloud Firewall that programmatically pushes and enforces cybersecurity policies for cloud computing environments via a central console to enable cybersecurity teams to inspect traffic and enforce policies wherever application traffic naturally flows.
In contrast, other centralized approaches to cybersecurity often require organizations to reroute traffic to specific firewalls to inspect it before policies are applied.
The survey finds that convergence of security and networking in the cloud will one day simplify operations and reduce risk.
It also finds respondents are hopeful that convergence will improve communications between cloud networking and cybersecurity teams.
In the meantime, cybersecurity teams clearly need to acquire cloud computing expertise.
Cybercriminals are increasingly targeting these platforms simply because the percentage of application workloads running on them continues to increase.
Far too many cybersecurity teams still lack visibility into these environments simply because they are typically provisioned directly by application developers rather than a centralized IT team.
Given the general lack of cybersecurity expertise the average developer has, it should not be much of a surprise that there are more vulnerabilities than anyone cares to admit.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 02 Feb 2024 20:13:06 +0000


Cyber News related to Survey Surfaces Raft of Cloud Security Challenges

2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
11 months ago Cybersecurity-insiders.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
11 months ago Techtarget.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
10 months ago Feeds.dzone.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
10 months ago Techtarget.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
5 months ago Esecurityplanet.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
5 months ago Esecurityplanet.com
Survey Surfaces Raft of Cloud Security Challenges - A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments. Conducted by Aviatrix, a ...
9 months ago Securityboulevard.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
9 months ago Esecurityplanet.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
8 months ago Techtarget.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
9 months ago Techtarget.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
7 months ago Techtarget.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
6 months ago Crowdstrike.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
4 months ago Esecurityplanet.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
9 months ago Securityzap.com
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
11 months ago Feeds.dzone.com
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL CERTIFICATION - The Certified Cloud Security Professional is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand ...
10 months ago Cybersecurity-insiders.com
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
10 months ago Securityzap.com
How to create a cloud security policy, step by step - What's needed is a set of rules for how cloud security is managed, and the key to that is a cloud security policy. A cloud security policy contains detailed guidelines to help an organization ensure that it operates safely in the cloud. Because cloud ...
6 months ago Techtarget.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
4 months ago Crowdstrike.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
10 months ago Feeds.dzone.com
How To Ensure Cloud Application Security - As the demand for cloud-based apps surged, more entrepreneurs switched to cloud models for their applications. There is a key concern involved with the cloud. Cloud computing has evolved for a long time in the past years and is not a new concept. ...
10 months ago Feeds.dzone.com
8 Hybrid Cloud Security Challenges and How to Manage Them - Business transitions, incompatible technology environments and rapid changes in dynamic public cloud services can cause hybrid cloud security challenges. Single hybrid cloud is now multiple clouds, said Mark Buckwell, executive cloud security ...
10 months ago Techtarget.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
8 months ago Techtarget.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
10 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)