Saturday, April 17, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Consumption of public cloud is way ahead of the ability to secure it

November 30, 2020
in Internet Security
Consumption of public cloud is way ahead of the ability to secure it
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

As companies need to build applications to cater for distributed workforces, the use of public cloud is a no-brainer, but as the parade of companies failing to secure S3 buckets shows, cloud customers are failing to secure it properly.

“What we’ve seen across the board is most customers consumption of public cloud is way ahead of their ability to secure it,” Barracuda senior vice president of data protection, network and application security Tim Jefferson told ZDNet.

You might also like

Cyberattack on UK university knocks out online learning, Teams and Zoom

Google backs new security standard for smartphone VPN apps

Mozilla to start disabling FTP next week with removal set for Firefox 90

“They haven’t figured out how to use the native services securely and how to instrument the controls because in many of those cases they’re very developer focus, so you’d have to essentially be a software developer to really understand how the application teams are using the native services, and then get your head around the best way [of] architecting controls.”

For Jefferson, he believes the solution is sitting right there on the cloud platforms themselves.

“The magic of public cloud is all the instrumentation and monitoring is done, it’s sitting there for free, which is historically the most expensive and hard part to do on premise,” he said.

“The trick now is just knowing how to call those APIs and suck in that telemetry and make it more actionable which companies like us have … we can identify within seconds, every resource that’s deployed, who deployed it, what its configuration state is, and how does that compare against best practice and then you can automate remediation.”

See also: Cybersecurity starts with the network fundamentals

Siran Eren, founder and CEO of zero trust access provider Fyde until November when the company was purchased by Barracuda, added it is possible to keep an eye on multiple clouds through a single interface.

“If you have Azure deployments, if you have a hybrid environment with AWS and GCP in the mix, you might have SaaS solutions like Office 365, Salesforce, you now have a control plane for security controls that basically covers all of them from a single poison policy point of view,” the now-vice president of zero trust access said.

“From this platform, you get a single control plane that spans over all your applications and you can define very broad yet granular policies from a single point. That’s what I think we’re in the business for, not point products any more, something that spans across cloud service providers and SaaS solutions.”

As the shift to working from home at the start of the year began, the old reliance on the VPN showed itself to be a potential bottleneck to employees being able to do what they are paid for.

“I think the new mechanism that we’ve been sitting on — everyone’s been doing for 20 years around VPN as a way of segmentation — and then the zero trust access model is relatively new, I think that mechanism is really intriguing because [it] is so extensible to so many different problems in use cases that VPN’s didn’t solve, and then other use cases that people didn’t even consider because there was no mechanism to do it,” Jefferson said.

Going a step further, Eren thinks VPN usage between client and sites is on life support, but VPNs themselves are not going away.

“I would say to client-to-site VPN is gone — that’s going to be replaced with zero trust — but site-to-site VPN is actually going to remain and zero trust is going to be on top of it,” he said. “They’re complementary.”

Another effect from needing to handle a dispersed workforce has been the collapse of what was formerly a fairly-well defined corporate network perimeter.

Must read: Living with COVID-19 creates a privacy dilemma for us all

According to Jefferson, the new best practice is to push security controls as far out to the edge as possible, which undermines the role of traditional appliances like firewalls to be able to enforce security, and people are having to work out the best place for their controls in the new working environment.

“I used to be pretty comfortable. This guy, he had 10,000 lines of code written on my Palo Alto or Cisco and every time we did a firewall refresh every 10 years, we had to worry about the 47,000 ACLs [access control list] on the firewall, and now that gets highly distributed,” he said.

“We even saw that in web application firewalls where instead of having a single web application firewall across many applications, now you tie [a] single web application firewall rule set per app, which makes it loosely coupled and then you can scale independent with the individual application, you can tune the rules in.

“I think that’s been a big shift … getting away from the tightly coupled centralised policy enforcement to highly distributed push out to the edge loosely coupled architecture.”

Related Coverage

Credit: Zdnet

Previous Post

How to Build a Customer-Centric Supply Chain

Next Post

Machine Learning Software Market 2020 key players – Microsoft, Google, TensorFlow, Kount, Warwick Analytics – The Haitian-Caribbean News Network

Related Posts

Cyberattack on UK university knocks out online learning, Teams and Zoom
Internet Security

Cyberattack on UK university knocks out online learning, Teams and Zoom

April 17, 2021
Google backs new security standard for smartphone VPN apps
Internet Security

Google backs new security standard for smartphone VPN apps

April 16, 2021
Mozilla to start disabling FTP next week with removal set for Firefox 90
Internet Security

Mozilla to start disabling FTP next week with removal set for Firefox 90

April 16, 2021
Swinburne University confirms over 5,000 individuals affected in data breach
Internet Security

Swinburne University confirms over 5,000 individuals affected in data breach

April 16, 2021
OWC partners with Acronis protect your backups from ransomware attacks
Internet Security

OWC partners with Acronis protect your backups from ransomware attacks

April 16, 2021
Next Post

Machine Learning Software Market 2020 key players – Microsoft, Google, TensorFlow, Kount, Warwick Analytics – The Haitian-Caribbean News Network

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Cyberattack on UK university knocks out online learning, Teams and Zoom
Internet Security

Cyberattack on UK university knocks out online learning, Teams and Zoom

April 17, 2021
SBI Sumishin Net Bank partners with DLT Labs on supply chain financing network
Blockchain

SBI Sumishin Net Bank partners with DLT Labs on supply chain financing network

April 16, 2021
Machine learning approach identifies more than 400 genes tied to schizophrenia
Machine Learning

Machine learning models may predict criminal offenses related to psychiatric disorders

April 16, 2021
Templates Vs Machine Learning OCR | by Infrrd | Mar, 2021
Neural Networks

Templates Vs Machine Learning OCR | by Infrrd | Mar, 2021

April 16, 2021
How you handle email replies matters for great customer experiences
Digital Marketing

How you handle email replies matters for great customer experiences

April 16, 2021
Google backs new security standard for smartphone VPN apps
Internet Security

Google backs new security standard for smartphone VPN apps

April 16, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Cyberattack on UK university knocks out online learning, Teams and Zoom April 17, 2021
  • SBI Sumishin Net Bank partners with DLT Labs on supply chain financing network April 16, 2021
  • Machine learning models may predict criminal offenses related to psychiatric disorders April 16, 2021
  • Templates Vs Machine Learning OCR | by Infrrd | Mar, 2021 April 16, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates