Monday , December 9 2024

Only 45% of cloud data is currently encrypted

According to Thales, the number of businesses that suffered a data breach in their cloud environment last year increased to 39%, up from the 35% reported in 2022.

Cloud environments security

Google’s released “Vanir” Open Sources Security Patch Validation Tool

Google has announced Vanir, an open-source tool for detecting and fixing security vulnerabilities, publicly available for developers. Vanir is a...
Read More
Google’s released “Vanir” Open Sources Security Patch Validation Tool

Hacker Claim 1tb, Deloitte denies, What Inside!

The spokesperson from Deloitte told two international media that, “No Deloitte systems have been impacted,”. The allegations relate to a...
Read More
Hacker Claim 1tb, Deloitte denies, What Inside!

New Windows zero-day: Exposes credentials, Gets unofficial patch

A newly found zero-day vulnerability lets attackers steal NTLM credentials by manipulating targets into opening a malicious file in Windows...
Read More
New Windows zero-day: Exposes credentials, Gets unofficial patch

Daily Security Update Dated: 07.12.2024

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated: 07.12.2024

Patch urgently: Hundred of CISCO switches impacted

A bootloader vulnerability in Cisco NX-OS affects over 100 switches, enabling attackers to bypass image signature checks. Cisco issued security...
Read More
Patch urgently: Hundred of CISCO switches impacted

Multiple ICS Advisories Released by CISA

On December 5, 2024, CISA issued two advisories regarding Industrial Control Systems (ICS). These advisories highlight current security issues, vulnerabilities,...
Read More
Multiple ICS Advisories Released by CISA

New DroidBot malware to attack 77 banks and CES globally

DroidBot is a sophisticated Android Remote Access Trojan (RAT) that merges traditional hidden VNC and overlay functions with spyware-like features....
Read More
New DroidBot malware to attack 77 banks and CES globally

Deloitte faces alleged cyber incident, claimed over 1tb stolen

Brain Cipher, a ransomware group that emerged in June 2024, claims to have stolen 1TB of data from Deloitte UK,...
Read More
Deloitte faces alleged cyber incident, claimed over 1tb stolen

Singapore embraces AI data centres with smarter cooling systems

AI and GPU operations are crucial for modern data centers, but they generate significant energy consumption and heat. A new...
Read More
Singapore embraces AI data centres with smarter cooling systems

Daily Security Update Dated: 04.12.2024

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated: 04.12.2024

55% of respondents stated that human error is the main cause of cloud data breaches. This comes as businesses reported a dramatic increase in the level of sensitive data stored in the cloud. 75% of businesses said that more than 40% of data stored in the cloud is classified as sensitive, compared to 49% of businesses this time last year.

Software as a Service (SaaS) applications were identified by 38% of respondents as the primary target for hackers, while cloud-based storage closely followed at 36%.

Lack of control over encryption keys

The study revealed that despite the growing amount of sensitive data being stored in the cloud, the utilization of encryption remains surprisingly low. Only 22% of IT professionals reported that more than 60% of their sensitive data in the cloud is encrypted. According to the findings, on average, only 45% of cloud data is currently encrypted.

In addition, the study revealed that businesses have limited control over their encryption keys. Surprisingly, only 14% of the participants stated that they had full control over all the keys to their encrypted data in their cloud environments. In addition, almost 62% say they have five or more key management systems – creating increased complexity when securing sensitive data.

ALSO READ:

Ransomware tracker: The latest figures-July 2023

Surge in SaaS App adoption

The adoption of multicloud is experiencing a significant surge, with over 79% of organizations now utilizing multiple cloud providers. Notably, it’s not just infrastructure that is experiencing this growth. The use of SaaS apps is also on the rise significantly. In 2021, 16% of respondents reported their enterprises utilizing 51-100 different SaaS applications, while in 2023 this percentage increased to 22%.

Although the use of cloud technology continues to grow, there is still a notable obstacle that persists. 55% expressed that managing data in the cloud is more complex than in on-premises environments – up from 46% compared to the previous year.

Respondents are also highly concerned about digital sovereignty. 83% expressed concerns over data sovereignty, and 55% agreed that data privacy and compliance in the cloud has become more difficult.

Maintaining control and security in cloud environments

Strong security practices are crucial in mitigating data breaches, with identity and access management (IAM) playing a significant role. Encouragingly, the adoption of robust multifactor authentication (MFA) has risen to 65%, indicating progress in fortifying access controls.

It is quite surprising that only 41% of organizations have incorporated zero trust controls into their cloud infrastructure. Moreover, an even smaller percentage (38%) utilizes these controls within their cloud networks. These statistics highlight the need for greater emphasis on adopting comprehensive security measures to effectively safeguard sensitive data and enhance overall cyber security resilience.

Organizations need easy access to on-demand IT infrastructure and services in a dynamic multicloud landscape, according to Sebastian Cano, SVP for Cloud Protection and Licensing activities at Thales.

When handling sensitive data, it’s very important to consider cloud environments as an extension of the existing infrastructure for control and security purposes. Customer control of encryption keys is important because it allows organizations to benefit from the cloud’s scalability, cost efficiency, and accessibility while ensuring the highest level of integrity and confidentiality for their valuable information, said Cano.

Check Also

Oracle

CIRT-in flags Critical Flaw in Oracle Agile PLM Framework

CERT-In has flagged a security vulnerability in Oracle’s Agile Product Lifecycle Management (PLM) software, identified …

Leave a Reply

Your email address will not be published. Required fields are marked *