Surveying The Tech Security Professionals – IT Future

It

Cloud Security Professionals

Two new security tools are changing the way that companies think about security in the age of cloud computing.

Data Science continues to enjoy massive growth around the world as the adoption of cloud computing gains further traction amongst organizations. And security is never far from the heart of issues around cloud usage, as the potential costs of malicious strikes grows larger and larger due to the integrated nature of the global economy.

A recent survey of over 1600 IT professionals around the world and the state of their public cloud adoption revealed that nearly half of all organizations had at least 1 complete outage during the last year, averaging around 80 minutes in length. It may not sound like that much but the average annual losses have been estimated at just under US$4 million dollars due to outages, at an average cost of $12, 250 per minute.

With IT departments having less control over their security due to the nature of the public cloud, there is a growing need for a new generation of security tools. Two new models from OpenDNS Security Labs are attracting much interest due to their algorithm-based approach that “automates the process of threat discovery and predicting malicious attacks”. The detection model called ‘SPRank‘ (Spike Rank) tracks “patterns in network traffic, and listens for categorized malicious attack patterns”, in a way that can be compared to how music apps Pandora or Shazaam ‘’listen’’ to musical structures to identify individual songs.

open-dns-cloud

(Infographic Source: OpenDNS)

It’s a massive undertaking as SPRank is effectively analyzing worldwide Internet traffic for clues which would indicate that an attack is in progress. Initial testing has proven remarkably effective. In controlled tests with other security vendors, SPRank identified “70 compromised domains that had not been identified by any other vendor”, and on average, ”only 16% of security vendors catch the domains which are identified by SPRank”.

An even more secure next step is being called Predictive IP Space Monitoring and it takes the data generated in SPRank to a whole new level by tracking the steps a criminal goes through to set up attack infrastructure; from ‘’choosing a hosting provider to deploying server images’’. This data is invaluable in helping to predict where the next attack will be coming from.

The game of cat and mouse between criminals and the security minds dedicated to stopping them has been going on for years. With the cloud becoming such an incredibly valuable tool in the business mix of major economies, it’s no surprise that more and more sophisticated tools are being deployed to deal with more and more sophisticated threats.

By Jeremy Daniel

Drew Firment
Here’s How to Make Sure Your Skills are Cloud Ready This year will be a period of meteoric growth for the cloud industry. Research from Gartner suggests that global spending on public cloud services in ...
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Gilad David Maayan
What is Open Source Security? Open source software is now an inseparable part of most software projects. Research has estimated that as much as 90% of enterprise software is made up of open source components ...
Yuliya Melnik
DevOps Services Outsourcing The sooner you release your unique idea to the public, the higher the chance that it will receive the lion's share of the audience's attention. Delays in development can lead competitors to ...