BUDGETS ARE SHIFTING TOWARD A “CLOUD-FIRST” AND “CLOUD-ONLY APPROACH


Gartner has recenty predicted that by 2020, a corporate “no-cloud” policy will be as rare as a “no-internet” policy is today. CIOs will increasingly leverage a multitude of cloud computing providers across the entire IT stack to enable a huge variety of use cases and meet the requirements of their business unit peers. Indeed, the tides are shifting toward a “cloud-first” or even “cloud-only” policy... 

Marc Wilczek

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing 

Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“.

Included (below) is an infographic discovered via the Alienvault Blog which highlights some interesting research findings.

  • Security professionals stated that they share threat intelligence with trusted peers (56%), internally (47%), with government agencies (28%), publicly (18%) and with crowdsourced/Open Source platforms (15%).
  • The largest jump has been in the adoption of crowdsourced platforms for threat intelligence sharing, which increased by almost five times since last year. This trend will continue to escalate as confidence in threat sharing platforms increases and as the trusted peer groups of security professionals expands.

tis-infographic-final

The nature of the security industry has been extremely secretive, so it’s very encouraging to see that more people are utilizing different sources and are willing to more openly share threat intelligence,” said Javvad Malik, security advocate at AlienVault. “Malicious criminals innovate quickly, and the more our industry can achieve a similar level of agility through cooperation and collaboration, the more we can create a powerful collective defense against today’s advanced threats. Public threat intelligence sources, such as AlienVault’s Open Threat Exchange, enable even the smallest IT departments to leverage the collective knowledge of a global network of security experts to better identify, respond to and mitigate threats. We hope to see continued trust in these sources…”

CloudBuzz

A curated, syndicated list of leading technology news stories from around the world. Leading and trending stories are researched curated each day covering prominent technology vendors in the connected technology space.