451 Research “Modern Clouds Need A Novel Security Approach”

BACKGROUND:

451 Research released new findings titled “Modern Clouds Need a Novel Security Approach”, highlighting the challenges with fast-moving and increasing cloud security adoption and how to address them. Key findings include:

  • Cloud remains a significant gap for InfoSec
  • Security teams are looking to catch up in cloud expertise
  • Newer cloud security work is collaborative
  • Newer cloud deployment environments are increasingly automated
  • Centralized teams feel the brunt of multi-cloud and multi-platform

451 Research regularly reaches out to key IT stakeholders to research, among other things, different quantitative and qualitative aspects of their security programs. 451 Research found that having adequate knowledge of cloud platform capabilities and security controls topped the list of information security gaps for both 2019(48%) and 2020 (41%). An expert with Blue Hexagon offers perspective.

Experts Comments

October 18, 2021
Gajraj Singh
Chief Marketing Officer
Blue Hexagon

As security teams prepare to scale up expertise on securing cloud environments, we find it vital to require deep collaboration between cloud engineering and security. Security teams must be aware that they will need to support newer, faster processes, as well as new technology options, including a variety of cloud workloads, services, operating systems and serverless function execution. It is critical to cover the spectrum of security use cases along the entire lifecycle of building within the

.....Read More

As security teams prepare to scale up expertise on securing cloud environments, we find it vital to require deep collaboration between cloud engineering and security. Security teams must be aware that they will need to support newer, faster processes, as well as new technology options, including a variety of cloud workloads, services, operating systems and serverless function execution. It is critical to cover the spectrum of security use cases along the entire lifecycle of building within the code development pipeline, deployment to cloud and runtime monitoring and enforcement.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.