Today's top stories

How do you secure the cloud? New data points a way

Reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

The march toward the cloud for data and services has many companies rethinking their approach to cyber security. Do they need a cloud security strategy? What is different about a cloud security strategy? Recent surveys have shed light on how security strategies are changing, and more important, how they should change.

Placing more IT infrastructure in the cloud is in some ways more secure than having it in house. For instance, you can be reasonably sure that the system is running the latest version with the proper patches in place. Cloud service providers are also building in new capabilities such as using machine language for anomaly detection. However, it also presents new risks, some of which is the result of misunderstanding how to manage cloud security.

It is important to know how a company’s cloud IT strategy—whether it’s hybrid, private hosted, or public—affects its cyber security strategy and the tactical execution of that strategy.

What sensitive data is in the cloud?

In October 2018, McAfee released its Cloud Adoption and Risk Report 2018. That research showed that sharing of sensitive data over the cloud increases by 53 percent over the previous year—a huge jump. Of all files in the cloud, 21 percent contain sensitive data, McAfee found, and 48 percent of those files are eventually shared.

To continue reading this article register now

SUBSCRIBE! Get the best of CSO delivered to your email inbox.