Tech Crunch

Three years after moving off AWS, Dropbox infrastructure continues to evolve

Conventional wisdom would suggest that you close your data centers and move to the cloud, not the other way around, but in 2016 Dropbox undertook the opposite journey. It (mostly) ended its long-time relationship with AWS and built its own data centers. Of course, that same conventional
/
The Guardian

Deepfakes aren’t a tech problem. They’re a power problem

By framing deepfakes as a tech problem we allow Silicon Valley to evade responsibility for its symbiotic relationship with fake news In the lead-up to the 2016 election, very few predicted the degree to which online misinformation would disrupt the democratic process. Now, as we
/

Cloud Security Solutions

Roughly one third of enterprises in North America experience troubles maintaining their cloud security due to the fast progress in cloud technologies and the complex nature of the cloud, a report by Threat Stack and the Enterprise Strategy Group reads. Other challenges include growing number and complexity of regulations, which prevents new business endeavors and slows down the pace of growth of current business operations in the cloud. Nonetheless, containerization is on the rise and hybrid environments gain popularity.

Cloud Security Challenges to Enterprises

One of the greatest concerns of North American businesses is the visibility of their cloud workloads. Close to two thirds, or 62 percent, want more visibility into cloud workloads, which is getting more and more difficult provided that 28 percent of businesses will run a hybrid cloud solution within a year. According to the survey, one fifth of businesses plan to run workloads on five different cloud service providers.

Only one in four enterprises is relying on native security controls provided by a cloud vendor, though. Some 54 percent of respondents use a combination of third-party and native controls while 53 percent consider production database server as the most critical type of cloud workload they must secure.

Cloud Solutions

(Image Source: Threat Stack and the Enterprise Strategy Group)

Other security challenges before businesses running cloud operations is the inability of security tools to prevent misconfiguration and software vulnerabilities. While the latter will not be fixed any time soon, cloud providers can think of better misconfiguration controls and automated protection. This is in line with respondents’ statement that security tools are unable to perform key tasks such as automation through integration of DevOps tools.

Furthermore, security tools are unable to secure visibility into system-level activity, enterprises complain. This is an alarming finding given that 31 percent of businesses cannot cope with the rapid pace of cloud developments, which means the above issues could only worsen in the next years.

Compliance Requirements Prevent New Business

More than half of businesses in North America are of opinion that security and compliance requirements slow down the sales process and their overall sales cycle. While 31 percent of all investment in cloud security is forced by the need to meet external compliance requirements, 59 percent of business say their sales process is slowing down because of such requirements and 57 percent complain about sales cycle delays.

Security compliance is obviously the major driving force behind investment in cloud security. Nonetheless, 26 percent of businesses surveyed say they experience difficulties achieving the required visibility to identify misconfigurations. This translates into failure to meet compliance requirements, which slows down further their overall business development.

Containerization Is Gaining Popularity

Another key finding is that some 42 percent of enterprises have already adopted containerized product applications, which in turn poses further cloud security risks. Containers introduce further layer of security and compliance issues provided that additional 23 percent of businesses are to deploy containerization over the next 12 months. Use of containers will double in the next 12 months with further 22 percent of enterprises beginning to test containers during the period.

Approximately one third of businesses express concerns over the lack of access to viable security solutions for containers and another one third is worried their current cybersecurity solution does not cover containers. Actually, containers represent the single most important security challenge bearing in mind that market penetration will reach about 90 percent as early as next year.

Thus, enterprises need to adopt an integrated security strategy instead of seeking multi point solutions or taking fragmented approach toward cloud security. Implementation of comprehensive intrusion detection platforms is another viable method to cope with the security challenges posed by cloud complexity, compliance, and increasing adoption of containers.

By Kiril V. Kirilov

Kiril Kirilov

Kiril V. Kirilov is a content strategist and writer who is analyzing the intersection of business and IT for nearly two decades. Some of the topics he covers include SaaS, cloud computing, artificial intelligence, machine learning, IT startup funding, autonomous vehicles and all things technology. He is also an author of a book about the future of AI and BIg Data in marketing.

Kayla Matthews

5 Cybersecurity Trends Defining 2019

5 Cybersecurity Trends The cybersecurity industry continually evolves to meet changing needs and adopt new technologies. As such, it's appropriate ...
Mark Casey Apcela

Why CloudHubs are an Important Ingredient to Optimizing Performance of Cloud-based Applications

CloudHubs - Optimizing Application Performance It may seem hard to believe, but even in this day and age, there are ...
Rainmaking From The Cloud - CIOs Struggle To Keep Pace With IT Demands

Rainmaking From The Cloud – CIOs Struggle To Keep Pace With IT Demands

CIOs Struggle With IT Demands In the digital era, where customers can select virtually anything with a click of a ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Bloomberg

The Trade War Is Set to Hit Tech, but Not as Hard as Your Wallet

/
Over the last year, technology companies were hopeful they might remain at least somewhat shielded from an intensifying bilateral trade war. After numerous exemptions, a far-reaching tax hike is finally ...
NYT

Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000

/
MIAMI — The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an extraordinary vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s ...
Slack

Slack to take unusual route to public markets, likely valuing it around $16 billion

/
NEW YORK (Reuters) - Slack Technologies, the fast-growing workplace messaging and communication platform, is poised for an unusual public listing on Thursday that will see it trade on the New ...