November 24, 2014 By Rick M Robinson 2 min read

Information technology (IT) and the ways businesses and other organizations use that technology are undergoing a transformative change. The cloud, along with mobile — the two are deeply intertwined — are changing the ways organizations manage their crucial information.

The requirements of information security are also undergoing dramatic changes. Staying ahead of threats is an ongoing challenge in the cloud and mobile era, while the threats themselves are ever more sophisticated. What can organizations do to protect themselves and their most valued data?

Moving Beyond the Myths

At a Web event in early November, Brendan Hannigan, general manager of IBM Security Systems, presented an overview of the new world of security threats and what organizations can do to protect themselves.

The first step in staying ahead of threats is letting go of security myths that remain pervasive. Firms continue to believe they are not infected; they are. Firms also believe that what they’ve already done is sufficient; it isn’t. They look for a magic bullet; there isn’t one. Or they believe that the whole company has to be put in a state of lockdown. It doesn’t.

The key to effective security is not wishful thinking on one hand and paranoia on the other. The key is deploying intelligence.

Staying Ahead of Threats

In everyday usage, “intelligence” means being smart. In a more technical sense, it means gaining information about threats. Both meanings apply to security intelligence.

Cybercriminals and other malicious hackers are relentless and sophisticated. However, they do not have magical powers. Their efforts to break into an organization’s information systems leave telltale traces. These signals can alert the security team to the attempted attacks and guide countermeasures to block the attack and safeguard priceless information.

A key first step in security intelligence is assessing an organization’s data and setting priorities. About 70 percent of the value of publicly traded corporations is embodied in intellectual property and other crucial data. Yet these “crown jewels” of information typically account for less than 2 percent of total data holdings. Not all data is created equal; the most critical data should be afforded the highest level of security protection.

Security In and Through the Cloud

Cloud computing has become a central feature in today’s information environment. Organizations look to the cloud for reduced costs and increased efficiency. Mobile technology relies on the cloud to connect devices and users. However, anxiety about cloud security remains widespread. This need not be the case. Tools for effective, integrated security across public, private and hybrid clouds are now readily available.

The essential components of cloud security are presented in a white paper that accompanied the Web presentation. These components are visibility, security intelligence and threat-aware identity and access management. Combined, they ensure organizations know who and what is going on in their cloud environments. By staying ahead of threats, organizations can ensure the cloud is a safe, secure environment.

More from Cloud Security

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Cloud threat report: Possible trend in cloud credential “oversaturation”

3 min read - For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.A recent X-Force Cloud Threat Landscape Report has shed light on this fact, revealing a new trend in the average prices for stolen cloud access credentials. Since 2022, there has been a steady decrease in market…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today