According to the 2021 IBM Security X-Force Cloud Threat Landscape Report, over half of breaches were the result of shadow IT and two-thirds of improperly configured APIs accounted for most cloud security incidents in last year.

According to the 2021 IBM Security X-Force Cloud Threat Landscape Report, over half of breaches were the result of shadow IT and two-thirds of improperly configured APIs accounted for most cloud security incidents in last year.
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
<p style=\"font-weight: 400;\">To accelerate the ability to meet business needs, moving IT systems to the cloud became a key tactic and this was accelerated during the pandemic; if businesses were not digital, they were at risk of dying.</p>
<p style=\"font-weight: 400;\">While IT and security organizations have typically been gatekeepers, ensuring strong IT practices, compliance, security, and risk management, their processes are often perceived as slow by business owners.</p>
<p style=\"font-weight: 400;\">In addition to moving to the cloud — often without IT support — businesses now rely on software and web apps that rely on microservices, building blocks of functionality that come from multiple sources — a veritable software supply chain. While this allows for much greater speed, flexibility, and distribution of effort, from a risk management perspective it creates a very dangerous situation. IT doesn’t know when and where technology is deployed, and even when they do, the supply chain approach means that known vendors or partners may themselves obtain code from their partners. This dependence may be unknown and therefore, undisclosed, lengthening the software supply chain, increasing business risk, and creating a perfect storm for potential vulnerabilities. Smart organizations should invest in visibility and control tools, and change the culture of security to be one that enables business rather than one that blocks or slows it down.</p>