January 13, 2015 By David Chang 2 min read

If necessity is the mother of invention, then cybersecurity is the biggest baby Mother Invention has ever birthed. The headlines these days demonstrate the magnitude of the cybersecurity problem, but the data is even more telling. Data protection is becoming a key factor for security leaders’ cloud security strategies. The average company has to deal with 1.7 million security events each week, and one study conducted by IBM found that the cost of the average security breach is $3.5 million per breach.

One of the key ways IBM thinks the cyberthreat will be neutralized is through invention — and IBM has a long history in security invention. The company already has more than 3,000 security-related patents and is still investing and innovating. In fact, in 2014, IBM inventors drove a 40 percent uptick in security patents from the previous year.

Boosting Cloud Security Through Innovation

I am fortunate to be part of a global team of 6,000 security researchers, developers and subject-matter experts at IBM who are tackling one of the largest challenges the computing industry has ever faced. IBM also conducts security research and development at 29 locations worldwide and manages security for thousands of customers at 10 of its Security Operations Centers.

One IBM invention is U.S. patent No. 8,812,406, which I developed with a team of three other IBM inventors. It is an authentication model for cloud security that lets customers retain control of their data that is stored in applications on a public cloud. It warrants cloud providers to contact customers for a security code to gain access to their information.

We are all using the cloud, and businesses are feeling pressure to protect our data and their own data. In fact, a new IBM study of nearly 150 chief information security officers found that while 85 percent say their organizations are now moving to the cloud, almost half of them expect a major cloud provider to experience a breach.

Patents such as this one help solve the real-world cloud security challenge that is inhibiting cloud computing growth. IBM’s investment in research and development is producing innovations that continue to advance the company’s cloud computing and security leadership. Over the past five years, IBM has more than doubled its annual output of patents for game-changing technologies such as security, cloud, analytics, mobile and social.

Year after year, IBM’s inventors continue to prove that this is a golden age of innovation. However, cybercriminals are also part of this golden age and are quickly finding ways to circumvent legacy approaches for securing businesses and people. This is why inventing new approaches to security is the only way the cycle will be broken. I am proud to be on the side of the “good guys” in this fight and remain optimistic that, with time, Mother Invention’s latest crop of inventions will provide the edge needed in the fight against cybercriminals.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today