• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Cloud Computing

Cloud-based and automated cyber security in the new normal

Cloud-based and automated cyber security in the new normal
  • Computing Staff
  • 25 September 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Earlier this year, companies faced massive disruption in their workflows as the UK went into lockdown. Suddenly, everything that had been ‘normal' - from the daily commute to eating out - was off the cards, and everybody had to adapt to a more remote way of life. For some departments, the change was relatively simple - just grab a laptop and go - but for others, there are a host of challenges in the new normal.

Security is a specialised and important job. These teams are tasked with protecting organisations from external and internal threats of all types, and the job is difficult and stressful at the best of times. The last six months have not been the best of times.

Computing research shows a sharp rise in cyber incidents since lockdown began, with nearly half of IT leaders (47 per cent) reporting an increase. The perimeter of nearly every organisation has widened far beyond head office, to wherever employees happen to be based, but many organisations hadn't planned for that scenario - and even those that had hadn't anticipated it on such a large scale.

Home is where the risk is

Three-quarters of organisations say that more than half of staff are working from home, and more than four in five (86 per cent) expect the trend to continue after lockdown. Thus, the easy-to-implement, short-term solutions organisations used to manage security at the start of lockdown will need to be re-evaluated to ensure they are suitable for long-term use.

The vast majority of organisations are already using strict password policies, VPNs and multi-factor authentication to protect their remote workforce; but with remote work set to become the new normal - especially as the prospect of a second lockdown looms - investment in more involved tools is set to rise.

Asked about tools or measures to protect their remote staff over the next 12 months, almost a third of IT leaders (30 per cent) said they would look at cloud-based security tools, which are a great help with the digital, dispersed perimeters modern organisations have to protect.

Cloud-based security tools allow IT teams - who face the difficult task of securing the new infrastructure - to monitor and protect devices off-domain. Think of it in the same way as SaaS: solutions that don't require any extra on-premises hardware or software, and are always up to date with the newest patches and definitions. Yes, you're handing over a lot of your security to an external company, but in reality, these firms have more expertise and resources than any firm whose core competencies are not in security.

Sharing the load

In the same question, we asked about security automation: currently only used by one-fifth of organisations (21 per cent). However, expect to see a sharp rise over the next 12 months, with more than a quarter (26 per cent) of respondents expressing an interest in the area.

Automated security tools use pre-set definitions to detect and respond to threats without human intervention. More advanced tools incorporate machine learning to learn from threats already encountered. Their main strength is in freeing security teams up from handling routing tasks like false positives, allowing them to focus on more detailed, specialist work.

Cloud-based and automated security often go hand-in-hand, so these tools can benefit from real-time threat definitions.

Security sprawl has created complexity for security management, opening organisations up to significant risk. Most security innovations over the past decade have focused on identifying and reacting to individual attacks; little work has focused on hardening infrastructure itself, or using the infrastructure to better protect an organisation.

The way forward is an intrinsic security approach that combines detecting and responding to threats, in addition to hardening infrastructure.

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Cloud Computing

More on Cloud Computing

Webinar: Defeating data disasters
Webinar: Defeating data disasters

Join us as we discuss the role cloud data management plays in modern business

  • Cloud Computing
  • 08 January 2021
The FT has gone 'cloud-only'
The FT goes 'cloud-only', using AWS and GCP

Greg Cope, technical director for enterprise services, and interim CTO Mark Ridley discuss the successes and pitfalls along the way, as the organisation managed to ditch all of its data centres during the global pandemic

  • Cloud Computing
  • 06 January 2021
'Cloud is at an inflection point': Kubernetes specialist Appvia on being selected by Bank of England to lead its cloud transformation

Appvia was selected to lead the transformation project from a long list of 46 suppliers

  • Cloud and Infrastructure
  • 14 December 2020
CIOs admit their monitoring strategies need work
'Too many tools, too much noise' - CIOs bemoan tool sprawl and monitoring challenges

A group of IT leaders at a recent Computing virtual roundtable discusses cloud and monitoring strategies, with most seeing issues with too many tools and dashboards giving rise to information overload, often burying critical data

  • Cloud Computing
  • 27 October 2020
Industry experts discuss disparities in cloud ERP
Industry experts discuss disparities in cloud ERP

The webinar will delve into cloud versus SaaS deployment environments, and how you can utilise IT skills to boost your business

  • Cloud Computing
  • 18 September 2020
blog comments powered by Disqus
Back to Top

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Google locks out another top AI ethicist
Google locks out another top AI ethicist
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
Hackers 'manipulated' stolen documents to undermine trust in coronavirus vaccines
Hackers 'manipulated' stolen documents to undermine trust in coronavirus vaccines
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading