Rapidly changing environments
One in four attacks worldwide in 2021 was concentrated in the Asia-Pacific region, one of the most targeted by cybercriminals. According to research, server access and ransomware are two of the most common means of attack. The three main countries facing the consequences of the attacks are India, Japan and Australia. However, the fact that Indonesia, Vietnam, Malaysia, Singapore and Thailand are also at risk of aggression shows that no place is safe.
Companies have been forced to rapidly change the way they do business in the wake of the global pandemic in order to keep pace with the environment. For Vijendra Katiyar, Country Manager, India, and SAARC, Trend Micro discusses their business as they described some cloud security issues. Misconfigurations, exploitation of serverless and containerized workloads, and less reliable third-party resources are of particular concern. To address this varied list of security challenges, a cloud security services platform approach is needed to protect servers, resources, and applications in the cloud. “Organizations will shift gears once again this year, prioritizing their digital transformation and hybrid work journeys. This will be driven by a focus on hybrid cloud strategy, AI in cloud computing and a rise of serverless that will help businesses create new user experiences that make innovation more accessible,” he adds.
Enterprises are placing greater emphasis on and trusting third parties when adopting cloud and hybrid cloud strategies. Supplier risk has always been and will continue to be a cybersecurity issue. Companies and third parties are expected to work together more closely to develop frameworks of shared responsibility and practice solutions that promote compliance, trust and openness. “Security will become everyone’s job, and it’s crucial to deploy zero-trust environments rather than integrating all departments for complete digital visibility and control. We also anticipate and encourage more investment and innovation in the cybersecurity industry to create seamless solutions for users,” said Michael Montoya, senior vice president and chief information security officer at Equinix. .
Enterprises are placing greater emphasis on and trusting third parties when adopting cloud and hybrid cloud strategies. Supplier risk has always been and will continue to be a cybersecurity issue. Companies and third parties are expected to work together more closely to develop frameworks of shared responsibility and practice solutions that promote compliance, trust and openness. Akshat Jain, CTO & Co-Founder, Cyware also shares his opinion on this, stating that “As assets are spread across multiple environments, organizations need a holistic cybersecurity strategy involving security automation solutions. that offer their security teams the ability to take response action across cloud, on-premises, or hybrid environments.” Additionally, security teams need to gather threat intelligence from the security technologies installed on the platforms. -forms cloud in addition to other internal and external sources of threat data to enable proactive threat detection and response.Cloud-native applications are also growing in popularity, necessitating new cutting-edge security solutions to protect these deployments.
Innovation, scalability and speed
“The speed of composable platforms is a game changer; businesses can connect data that predicts a customer’s needs and provides the next best action at the time. These platforms can orchestrate customer and employee experiences in real time, routing calls to the agent most likely to deliver a positive outcome. In the fast approaching future, composability will be a key requirement for CX cloud platforms,” said Raja Lakshmipathy, Managing Director – India and SAARC, Genesys. The real-time assembly, integration and orchestration of capabilities across four fundamental building blocks – development, ecosystem, market and product – are enabled by compostable platforms. The API-first, continuous deployment, global availability, and built-in security features of contemporary clouds were the ancestors of these secure and adaptable platforms, which they now complement.
Micheal Montoya discusses the growing number of cyberattacks and explains that with threat actors becoming more sophisticated, innovative and collaborative, cybersecurity responsibilities today extend beyond security professionals . More than ever, cybersecurity must be a priority for all digital and technology executives. He goes on to say that hacks are inevitable as long as businesses continue to use cloud services and undergo digital transformation. “The question now shifts from ‘if’ to ‘when’. Digital leaders will play a larger and more vital role in helping businesses address threats and risks while anticipating what comes next,” he explained.
The more groups organizations create, the more complicated security becomes. Many organizations still manage security through separate functions. They might think it’s an advantage, but threat actors really benefit from security complexity because it makes it easier for them to find flaws in the system. Particular attention will be paid to the integration of security for better visibility and management. “At Cisco, we are extending our cloud strategy across all domains to help businesses connect, secure, and automate to deliver a seamless digital experience. Our full-stack observability goes beyond domain monitoring to full technology stack visibility, insights, and actions across the multi-cloud environment so operations teams can deliver and optimize customer experiences,” Trideeb Roy, Director – Sales, Data Center, Cisco India & SAARC said: Adding to this, he also speaks of the value of having Cisco Intersight on board, stating “Cisco Intersight provides a portfolio of services that enable visualization and intelligent orchestration to bring together teams, infrastructure and applications. And our AI/ML-powered Workload Optimization Manager ensures application performance by giving workloads the resources they need when they need them.” Finally, it concludes by explaining how their Secure Cloud Insights also tracks and normalizes data across multi-cloud environments and is integrated with SecureX, their cloud-native security platform, to strengthen cloud security.