rapidly changing environments
One in four attacks worldwide in 2021 was concentrated in the Asia-Pacific area, one of the most attacked by cybercriminals. According to research, server access and ransomware are two of the most common forms of attack. The top three countries facing the consequences of the attacks are India, Japan and Australia. However, the fact that Indonesia, Vietnam, Malaysia, Singapore and Thailand are also at risk of attacks shows that nowhere is safe.
Companies have been forced to rapidly change the way they do business as a result of the global pandemic to keep up with the environment. For Vijendra Katiyar, Country Manager, India and SAARC, Trend Micro talks about their business as they outlined some cloud security issues. Of particular concern are misconfigurations, exploitation of serverless and containerized workloads, and less reliable third-party resources. To address this diverse list of security challenges, a cloud security services platform approach is necessary to protect cloud servers, resources, and applications. “Organizations will be shifting gears once again this year, prioritizing their digital transformation and hybrid work travel. This will be driven by a focus on hybrid cloud strategy, AI in cloud computing, and a rise in serverless that will help businesses create new user experiences that make innovation more accessible,” she adds.
Organizations are placing more emphasis and reliance on third parties as they adopt cloud and hybrid cloud strategies. Vendor risk has always been and will continue to be an issue in cybersecurity. Companies and external parties are expected to work more closely together to develop shared responsibility frameworks and implement solutions that promote compliance, trust and openness. “Security will become everyone’s job, and it’s critical to implement zero-trust environments that integrate all departments for complete digital visibility and control. We also anticipate and encourage further investment and innovation in the cybersecurity industry to create frictionless solutions for users,” said Michael Montoya, senior vice president and chief information security officer at Equinix.
Organizations are placing more emphasis and reliance on third parties as they adopt cloud and hybrid cloud strategies. Vendor risk has always been and will continue to be an issue in cybersecurity. Companies and external parties are expected to work more closely together to develop shared responsibility frameworks and implement solutions that promote compliance, trust and openness. Akshat Jain, CTO and Co-Founder of Cyware, also shares his thoughts on the matter, stating that “As assets are distributed across multiple environments, organizations need a holistic cybersecurity strategy that involves security automation solutions that provide their teams with security the ability to take responsive action in all environments. cloud, on-premises or hybrid environments”. In addition, security teams must collect threat intelligence from security technologies installed on cloud platforms, in addition to other internal and external sources of threat data to enable proactive detection and response to threats. In addition, cloud-native applications are growing in popularity, requiring new cutting-edge security solutions to protect such deployments.
Innovation, scalability and speed
“The speed of composable platforms changes the rules of the game; companies can connect data that predicts a customer’s need and offers the next best action in the moment. These platforms can orchestrate customer and employee experiences in real time, routing calls to the agent predicted to be most likely to deliver a positive outcome. In the fast approaching future, composability will be a key requirement for CX cloud platforms,” said Raja Lakshmipathy, General Manager of India and SAARC, Genesys. The real-time assembly, integration, and orchestration of capabilities across four fundamental building blocks (development, ecosystem, market, and product) are made possible by compostable platforms. The API-first, continuous deployment, global availability, and built-in security features of contemporary clouds were the ancestors of these secure and adaptable platforms, which they now complement.
Micheal Montoya addresses the growing number of cyberattacks, explaining that as threat actors become more sophisticated, innovative, and collaborative, today’s cybersecurity responsibilities extend beyond security professionals. Now more than ever, cyber security must be a top focus for all digital and technology executives. He goes on to say that attacks are inevitable as long as companies continue to use cloud services and undergo digital transformation. “The question now moves from ‘if’ to ‘when.’ Digital leaders will play a more prominent and vital role in helping businesses navigate threats and risks while anticipating what’s next,” he explained.
The more groups organizations create, the more complicated security becomes. Many companies still manage security through segregated functions. They may think this is a benefit, but threat actors actually benefit from security complexity because it makes it easier for them to find flaws in the system. Particular attention will be paid to integrating security to improve visibility and management. “At Cisco, we are expanding our cloud strategy across all areas to help businesses connect, protect and automate to deliver a seamless digital experience. Our full-stack observability goes beyond domain monitoring to full-stack visibility, insights, and actions across the technology stack in the multi-cloud environment so operations teams can deliver and optimize customer experiences. customers,” Trideeb Roy, director of sales, data center. , Cisco India & SAARC said: In addition to this, he also talks about the value of having Cisco Intersight on board, stating that “Cisco Intersight provides a portfolio of services that enable intelligent visualization and orchestration to bridge equipment, infrastructure and applications. And our Workload Optimization Manager, powered by AI/ML, ensures application performance by giving workloads the resources they need when they are needed.” Finally, he concludes on how Secure Cloud Insights also tracks and normalizes data across multi-cloud environments and integrates with SecureX, its cloud-native security platform, to strengthen cloud security posture.