t cht lk
CLOUD CYBERSECURITY BEST PRACTICES FOR CISOS AND CIOS
With the cloud now widely adopted , many still appear to be unaware of the vulnerabilities they ’ re encountering and the steps to take to prevent them . Amit Tailor , Director , Systems Engineering , Palo Alto Networks , says that cloud security is possible but will only be achieved by taking systematic steps to strengthen your cloud cybersecurity posture .
It ’ s undeniable that rapid cloud adoption by organisations across all continents is not slowing down . Yet , even as cloud computing capabilities mature and expertise is accumulated , the complexity of the technology is increasing inadvertent cybersecurity risks by introducing vulnerabilities and misconfigurations .
An insight into this challenge comes from Unit 42 ’ s seventh study into the cloud cybersecurity of thousands of organisations worldwide , which revealed unpatched vulnerabilities continue to plague cloud computing . The study found nearly two-thirds ( 63 %) of the codebases in production have unpatched vulnerabilities rated high or critical and 11 % of the hosts exposed in public clouds also have high or critical vulnerabilities .
What lies behind these shortcomings in cloud cybersecurity is how technology and security teams are struggling with the technology . The same set of risky behaviours is repeated even among experienced teams , which include unrestricted firewall policies , exposed databases and unenforced Multi-Factor Authentication ( MFA ).
The reason for the persistence of these security errors is doing the security remediation work is time consuming and problematic . From what security teams have shared with us , over half ( 60 %) of organisations take more than four days to fix security issues . When a security alert appears , security teams can often take several days to resolve it . Given how a threat actor can exploit newly disclosed vulnerabilities in a matter of
www . intelligentcio . com INTELLIGENTCIO EUROPE 77