Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hcaptcha-for-forms-and-more domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hcaptcha-for-forms-and-more domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
Ensuring Enterprise Cyber Security in the Age of the Multicloud
Sunday, December 22, 2024

Trending Topics

HomeTop NewsEnsuring Enterprise Cyber Security in the Age of the Multicloud

Ensuring Enterprise Cyber Security in the Age of the Multicloud

spot_img

By Sandeep Bhargava, SVP, Managing Director, Asia Pacific and Japan, Rackspace Technology With the multicloud strategy being widespread today, companies are challenged by the lack of well-defined boundaries in their IT environment. With the extension of transformation projects across diverse platforms, as well as the existence of workloads in multiple locations, organisations are confronted with the intricate task of protecting their digital assets and maintaining security. The situation is already being exploited by cyber criminals, especially in India where 74 percent of local enterprises fell victim to ransomware in 2022.

While enterprises as a whole are predicted to increase spending on security and risk management by 13 percent in 2024, it is equally important for organisations to adopt a new mindset when it comes to security in this complex landscape. For security to seamlessly adapt as the perimeter expands it is imperative to re-evaluate the role of tools, people, and organisational structure in ensuring resilience. By embracing a comprehensive and proactive approach, businesses can safeguard their valuable assets, maintain operational efficiency, and protect their reputation.

The right tools for specific needs With the ever-growing number of cloud security tools available, it is important to recognise that each tool has its unique strengths and limitations. It is crucial for organisations to carefully evaluate which tool aligns best with their specific needs and security requirements. One factor to consider is whether a specific tool can seamlessly accommodate a wide range of operations.

Organisations should prioritise solutions essential elements such as robust identity and access management, adherence to compliance regulations, effective governance, proactive reporting, and heightened awareness of potential security risks. Furthermore, enterprises should also explore tools that offer centralised control over network access and security events through a communication protocol called a message bus or a service bus. This enables different systems to effectively communicate through a shared set of interfaces.

Minimising human error Organisations should also not overlook the importance of addressing the human element. While human error can never be eliminated, proactive steps can be taken to minimise the likelihood and impact of unintentional security action. In addition to enhancing cybersecurity training programs and reinforcing best practices, there are now numerous tools available that seamlessly integrate into company processes, improving the deployment of code while prioritising security.

One of the most crucial vulnerabilities these tools address is the exposure of intellectual property through deployed code. Continuous Integration/Continuous Deployment (CI/CD), a software development protocol, offers a solution to the common human errors that often afflict traditional manual processes. By implementing automation throughout the entire app development process, efficiency can be increased, security can be enhanced, code quality can be improved, and the chances of manual errors leading to security vulnerabilities can be reduced.

Making security teams more agile Security should not be treated as a separate, reactionary response to incidents. Instead, it should be integrated into the entire organisational architecture, particularly the development process, in the form of agile security teams. By incorporating security engineering or training existing staff to be adjunct security experts, the security perspective is dispersed throughout the organisation, encouraging ingenuity, and keeping pace with the fast-moving business landscape.

Leveraging expert services as part of the overall cloud security approach Along with more agile security teams and CI/CD, managed cloud security providers can be an asset in ensuring an organisation’s security posture can keep up with the changes brought about by a multicloud approach. Not only do these providers have specialised knowledge and experience, as well as access to advanced security technologies that may be costly for businesses to acquire and maintain on their own, but their solutions are also scalable and can adapt to the changing needs of businesses. Equally important is how managed security providers can be cost-effective compared to building an in-house security team and infrastructure without compromising the protection of businesses and their data.

if (!window. AdButler){(function(){var s = document. createElement(“script”); s.

async = true; s. type = “text/javascript”;s. src = ‘https://servedbyadbutler.

com/app. js’;var n = document. getElementsByTagName(“script”)[0]; n.

parentNode. insertBefore(s, n);}());} var AdButler = AdButler || {}; AdButler. ads = AdButler.

ads || []; var abkw = window. abkw || ”; var plc516228 = window. plc516228 || 0; document.

write(”); AdButler. ads. push({handler: function(opt){ AdButler.

register(182450, 516228, [728,90], ‘placement_516228_’+opt. place, opt); }, opt: { place: plc516228++, keywords: abkw, domain: ‘servedbyadbutler. com’, click:’CLICK_MACRO_PLACEHOLDER’ }});.


From: expresscomputer
URL: https://www.expresscomputer.in/guest-blogs/ensuring-enterprise-cyber-security-in-the-age-of-the-multicloud/106348/

DTN
DTN
Dubai Tech News is the leading source of information for people working in the technology industry. We provide daily news coverage, keeping you abreast of the latest trends and developments in this exciting and rapidly growing sector.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

spot_img

Must Read

Related News