• About
  • Privacy Policy
  • Careers
  • Manage Subscriptions
Thursday, September 21, 2023
TechEconomy
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
Techeconomy
No Result
View All Result

Home » Is Cloud Native Security Good Enough?

Is Cloud Native Security Good Enough?

Techeconomy by Techeconomy
December 20, 2022
in Security
0
native Security
native Security

native Security

Sifax
Advertisements

Article by Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies.

======

Global organizations are digitally transforming via cloud native applications and services. Use of cloud native can drive innovation, accelerate speed to market, and can bring about cost savings that fuel new growth.

RelatedPosts

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

September 21, 2023

Boosting Collaboration and Strengthening Security with UC in the Financial Services Sector

September 20, 2023

Cloud native technologies enable organizations to tap into the agility required to keep up in the current competitive landscape and to create new business models. But achieving efficient, flexible, distributed and resilient cloud native security is tough.

All major public cloud providers -Amazon Web Services (AWS), Microsoft Azure and Google Cloud- of course offer security features and services, which are designed to address significant threats to cloud-based data.

However, in spite of this, public cloud providers’ security tools commonly fail to meet operational needs, and their limitations should prompt organizations to consider or reconsider how they are protecting public cloud environments.

Cloud providers’ efforts to ensure security are barely adequate. In the following section, I go into why that’s the case and how it could impact your organization:

1. Limited visibility

One of the major challenges associated with cloud-native is that, in contrast with on-prem deployment, owners cannot be sure of the security elements related to the cloud environment that the application is hosted on. As a result, it becomes the role of the IT team to track every resource and to add it to the application.

Monitoring needs to proceed throughout application lifecycles. Lack of adequate visibility can needlessly compromise security.

2. Cloud native exposure to threats

The cloud is accessible to anyone with an internet connection, which means that threat actors are continually searching for ways to undermine systems’ security.

As cyber attackers advance their strategies, cyber security prevention and defense methodologies also need to evolve. For example, enterprises need cloud security that can fend off brute-force attacks, phishing and SQL injections.

3. Policy centralization

At present, the average cloud native environment includes a number of tools from an assortment of developers and service providers.

In a multi-cloud infrastructure, information technology managers may face fragmented security access controls, and due to implementation in separate provider environments, an impossible-to-keep-up-with set of monitoring tools. Policy centralization can make security management more uniform and more successful.

4. Slow security processes

Key reasons as to why enterprises are moving to the cloud include speed, agility and flexibility. But security can easily get left in the dust, so to speak.

Given the speed of the continuous integration and deployment (CI/CD) pipeline, security can lag. Enterprises can solve for this issue by shifting security as far left as possible. You can create a Shift Left environment through a third-party security platform.  

Ensuring Cloud – Native Protection

Here are three key improvements to drive your organisation’s cloud-native security to ensure protection against upcoming sophisticated cyberattacks:

1. Improve Your Visualisation and Regular Reporting

To understand the current state of their security posture, enterprises must have access to up-to-date reports and visualizations (e.g., dashboards) that account for their entire application infrastructure to overcome information overload and lack of clarity, to quickly and effectively assess their overall security posture to improve upon, where needed

2. The Automation Game

Compliance rule sets and customized policies must be built into the development stages as well as carried over to runtime, which will require automation to ensure the deployment is compliant with internal and external rules.

3. Keeping up with Changes

Security professionals must keep pace with frequent changes to not only the resources within an expanding cloud sprawl, but security best practices and compliance regulations, which are being enacted at a rapid pace to keep up with the expanding cyberattacks taking place.

Efforts should also be made to keep up with the speed and scale of the organization with new security protection measures implemented accordingly.

For organisations who are facing such cybersecurity challenges, making every effort to reduce their enterprise risks and limiting their exposure to threats, will require prevention-first security instead of just leaving it at detection.

Check Point CloudGuard for Cloud Security Posture Management was designed to prevent critical cloud security misconfigurations, automates governance across assets and services and enforces security best practices and compliance frameworks.

By 2023, more than 500 million digital applications and services will be developed and hosted through cloud native means.

The findings and suggestions shared above, combined with the recent sharp increase in cyber attacks should lead organizations to consider whether or not they are making adequate effort to secure public cloud environments.

Advertisements
innovation
AIT
Advertisements
Tags: native Security
ShareTweetSend
Previous Post

Business in the Era of Everything-as-a-Service (XaaS)

Next Post

FG Earned $547m from the Sale of 5G Spectrum – President Buhari

Techeconomy

Techeconomy

Related Posts

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update
Security

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

by Joan Aimuengheuwa
September 21, 2023
0

At the core of this rebranding is a renewed sense of purpose and energy to enhance user privacy and protect...

Read more
UC solution and Security (Photo: GettyImages)

Boosting Collaboration and Strengthening Security with UC in the Financial Services Sector

September 20, 2023
Sha Zhu Pan Scammers Use Fake Cryptocurrency Trading Pools

The Story of One Scammed Victim in the Crypto Trading Pool Who Lost $22,000 in One Week, according to Sophos

September 20, 2023
Supply Chain Attack Targeting Linux

Kaspersky Reveals Three-year Long Suspected Supply Chain Attack Targeting Linux

September 19, 2023
SIM swaps and eFrauds in Nigeria

NCC Worried over Rising eFrauds in Nigeria’s Telecom Industry

September 15, 2023
Six Signs You Might Need a VPN for Secure Online Activities

Six Signs You Might Need a VPN for Secure Online Activities

September 14, 2023
Next Post
5G Spectrum

FG Earned $547m from the Sale of 5G Spectrum - President Buhari

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements
Ad 15
Insurance Meet Tech
Advertisements
ADVERTISEMENT
  • Trending
  • Comments
  • Latest
​Sodiq Tijani Toju Africa

Meet Sodiq Tijani, a Product Expert and Entrepreneur Banking the Unbanked

March 2, 2023
Product Led vs Sales Led Business Models

Product Led vs Sales Led Business Models: What Startups Should Know

January 10, 2023
Samsung Galayx A04e - Cheapest Samsung Phones in 2023

Cheapest Samsung Phones in 2023

September 11, 2023
Sodiq Tijani Youcloudpay

How Sodiq Tijani is Empowering African SMEs for Economic Growth

February 9, 2022
Google Cybersecurity Scholarship

Google Recognizes Shortage of Cybersecurity Experts in Africa, Announces Scholarships

22

Ad Dynamo Has Eyes on Nigeria – CEO

19

Digital Marketing in Africa: Bringing Much-Needed Skills to Nigeria’s Youth

16

Ad Dynamo by Aleph Group Launches free Digital Academy

14
microfinance banks

CBN Launches Portal for Seamless Licensing of Microfinance Bank

September 21, 2023
EBANX

Brazilian Fintech EBANX Expands into Eight New Africa Markets

September 21, 2023
Africa-America Institute

Africa-America Institute Honours MTN Group for Helping in Africa’s Digital Transformation

September 21, 2023
Six Signs You Might Need a High-Speed Mesh Wi-Fi System

Six Signs You Might Need a High-Speed Mesh Wi-Fi System

September 21, 2023

Follow Us

APPLY

Underdog Tech Award
Apply

InDrive Launches Underdog Tech Award to Reward African Founders

by Joel Nwankwo
September 20, 2023
0

The Underdog Tech Award, a brand-new international competition, has been launched by InDrive. The e-hailing company aims to uncover the...

Read more

WomenPreneurs

Hiring in South Africa by Jessica Hawkey redAcademy
WomenPreneurs

Women in Business: Q&A with Jessica Hawkey, Founder & MD of redAcademy

by Techeconomy
August 22, 2023
0

"Jessica Hawkey is the Managing Director of redAcademy"

Read more

BusinesSENSE For SMEs

Managing Difficult Customer
BusinesSENSE For SMEs

Five Keys to Managing Difficult Customers

by Techeconomy
August 23, 2023
0

You will at one point in your business be confronted with dealing with difficult customers. So, mastering the right strategies...

Read more
  • About Us
  • Career
  • Contact Us
  • Policy

© 2023 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV

© 2023 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.