Why cyber resilience remains an underrated element of the security strategy

A padlock.

A curious article from February 1’s issue of the Borneo Post shone a light on the gap between expectation and reality when it comes to cyber recovery.

Professional services provider KPMG surveyed Asia-Pacific organisations and found almost three quarters (73%) of CISOs did not have the influence to protect their companies fully. Moreover, while progress has been made on prevention and response programmes, businesses are still underestimating impacts on operations and recovery...

Encryption demand soars as 60% of business data kept on the cloud

The demand for cloud encryption is estimated to increase at a CAGR of 30.9% from 2022-2032. The market valuation is projected to increase by US$ 2.4 Bn by 2022 & US$ 34.8 Bn by 2032.

This is according to Future Markets Insight (FMI), which says organisations are investing in the modernisation of data storage strategy with the adoption of cloud technologies for digital transformation. This is expected to drive growth in the cloud encryption market.

The growing need to...

98.6% of companies have misconfigurations in their cloud environments

An unlocked padlock among jumbled up keys from a computer keyboard.

While the convenience and ease of public cloud technology has had a major impact on enabling scalable business operations to work from anywhere and increase productivity everywhere, the risks around using cloud technology are still slowly being realised and calculated by many organisations as they experience related attacks.

That is according to the Cloud (In)Security research from Zscaler Threatlabz, which analyses cloud workload statistics from over 260 billion daily...

Radware launches a spinoff of its cloud security business

A graphic of a padlock.

Radware, a provider of cyber security and application delivery solutions, has revealed the spinoff of its Cloud Native Protector (CNP) business to form a new company called SkyHawk Security.

To accelerate Skyhawk Security’s development and growth opportunities, an affiliate of Tiger Global Management will make a $35 million strategic external investment, resulting in a valuation of $180 million. Tiger Global Management is a leading global technology investment firm focused on...

F5 launches distributed cloud app infrastructure protection

F5 has launched the F5 Distributed Cloud App Infrastructure Protection (AIP), a cloud workload protection solution that expands application observability and protection to cloud-native infrastructures.

Powered by technology acquired with Threat Stack, AIP is the newest addition to the F5 Distributed Cloud Services portfolio of cloud-native SaaS-based application security and delivery services.

Organisations of all sizes across industries are in the midst of efforts...

Malware-delivering cloud apps almost tripled in 2022

A skull symbol within computer code.

More than 400 distinct cloud applications delivered malware in 2022, nearly triple the amount seen in the prior year, according to research conducted by Netskope, a specialist in Secure Access Service Edge (SASE).

The company's researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive.

Cloud apps are widely used by businesses, a fact not lost on attackers, which view these apps as an ideal home for hosting malware and...

Views from the field: Shifting left in enterprise cloud security  

A field on a sunny day.

Stuart Green, cloud security architect at Check Point Software, explains how businesses can mitigate cybersecurity risks.  

As of 2022, 94% of enterprises use cloud services. Confidence in the cloud has grown over the last 12 to 18 months, with 35% of organizations having more than 50% of their workloads in the cloud. While businesses are quick to deploy cloud solutions at scale, we’re not seeing the same rapid adoption of preventative cybersecurity measures to keep this...

90% of global enterprises are adopting zero trust

Scrabble tiles spelling 'trust'

Cloud security firm Zscaler has found that more than 90% of IT leaders, who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture.

Supporting the mass migration to zero trust to secure users and the cloud, more than two thirds (68%) believe that secure cloud transformation is impossible with legacy network security infrastructures or that ZTNA has clear advantages over traditional firewalls...

Oliver Paterson, VIPRE: On email security in the era of hybrid working

With remote working the future for so many global workforces – or at least some kind of hybrid arrangement – is there an impact on email security we are all missing? Oliver Paterson, director of product management at VIPRE Security, believes so.

“The timeframe that people expect now for you to reply to things is shortened massively,” says Paterson. “This puts additional stress and pressure on individuals, which can then also lead to further mistakes. [Employees] are not...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...