Friday, 5 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Cybersecurity trends and how to navigate them
Cloud Computing

Cybersecurity trends and how to navigate them

Last updated: July 23, 2025 7:56 pm
Published July 23, 2025
Share
Cybersecurity trends and how to navigate them
SHARE

As organisations worldwide proceed to grapple with an ever-expanding menace panorama, understanding the present cybersecurity developments has by no means been extra essential.

Forward of Cyber Security & Cloud Expo Europe, Bernard Montel,  EMEA Technical Director and Safety Strategist at Tenable, make clear the shifts in cybersecurity over the previous 5 years and presents invaluable insights into the challenges and developments shaping the business as we speak.

Within the face of more and more subtle threats, Montel’s views on danger administration, proactive safety measures, and the position of rising applied sciences like AI in cybersecurity provide invaluable steerage for navigating these turbulent waters.

Cloud Tech: How has the cybersecurity panorama modified within the final 5 years?”

Bernard Montel: The worldwide pandemic dramatically modified the best way we work and for some organisations this transition occurred virtually in a single day. As an alternative of travelling to places of work or different locations of labor we had been connecting to techniques and sources remotely. 

From a cybersecurity standpoint this has had a large impression in the best way we’d like to consider safety:

  • The house community, which had by no means been secured, all of the sudden turned an extension of the company community. House routers had been the one means workers may acquire entry to sources and expanded the menace panorama considerably.
  • Using Digital Non-public Networks (VPNs) and multi-factor authentication (MFA) was the one technique to safe these connections.
  • As organisations moved sources to the cloud, negating the necessity for VPNs, it simplified life for distant employees and supplied a layer of safety for organisations.

If we may retain one single post-pandemic change, it’s the acceleration of cloud providers (Software program-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and so forth.) The cloud has modified the best way we work as we speak eradicating the necessity for bodily racks of machines, accessible solely remotely. There isn’t any must be hardwired to the company community to be safe.

See also  Service for Data Center Market 2024 [Key Trends] | Huawei Technologies, Hitachi, Fujitsu

After all we nonetheless have some on-prem options deployed and used. Nonetheless, the overwhelming majority of organisations function a hybrid setting, combining a mix of personal and public cloud with on-prem sources. 

Immediately’s new regular means the “citadel” represented by the “company community,” is now fragmented—with the outcome that the assault floor has by no means been so massive or extra dynamic.   

CT: What are the highest present cybersecurity developments?

BM: Ransomware continues to be the highest menace as we speak. The variety of assaults skilled by organisations day by day is rising and breaches are breaking an increasing number of data by way of variety of data breached or quantity of knowledge exfiltrated.

Cloud safety is one other actual problem for all organisations. The transfer to cloud sources forces safety groups to rethink the best way they deal with safety. The standard perimeter strategy, with endpoint and/or server the main target of safety practices, is nearly ineffective after we are speaking about serverless microservices, and containers.

Identification has returned as the primary focus of concern. 25 years in the past we talked in regards to the problem of managing identities with the start of I&AM. The issue continues to be very a lot evident, however way more advanced: federated identities, MFA, Lively Listing and EntraID, mixed with all of the cloud-based identities with AWS, Azure, GCP… the listing goes on.

AI is, after all, like in every other expertise, one other space of focus. Attackers are simply starting to grasp the capabilities it presents and, as defenders, it’s important we additionally decide how one can utilise the expertise. 

See also  Is API design a lost art?

Harnessing the ability and velocity of generative AI – similar to Google Vertex AI, OpenAI GPT-4, LangChain, and lots of others – it’s doable to return new clever info in minutes. This can be utilized to speed up analysis and growth cycles in cybersecurity, to seek for patterns and clarify what’s discovered within the easiest language doable. Harnessing the ability of AI permits safety groups to work sooner, search sooner, analyse sooner, and in the end make selections sooner.

CT: What ought to organisations bear in mind as we speak when considering of their safety dangers?

BM: What we’d like to bear in mind is that, within the majority of cases, it’s a identified vulnerability that permits menace actors an entry level to the organisation’s infrastructure. Having gained entry menace actors will then look to additional infiltrate the organisation to steal information, encrypt stems or different nefarious actions. 

Non-malicious misconfigurations – so primary human error, from configurations left ‘by default’ to a developer submitting code via a DevOps excessive velocity cycle – these errors are human. Nonetheless, not checking for these misconfigurations leaves the doorways large open to attackers. 

Typically there’s a perception that, as a result of an organisation is ‘smaller,’ they received’t be a goal for assaults. That couldn’t be farther from the reality. Sure, usually it’s the huge names that make the headlines, however more and more smaller organisations are additionally focused as menace actors realise that they’re a part of the availability chain and sometimes open the door – given the interconnected working practices – to bigger firms. 

See also  Microsoft kicks off .NET 9

Ten years in the past a ransomware assault was actually apparent. The pc (PC) was bricked with a ransomware demand displayed on the display screen. Immediately, assaults are much less apparent and may go undetected for a number of weeks as menace actors look to obfuscate their presence permitting them to creep round infrastructure for nefarious functions.

Ransomware gangs will make use of double extortion strategies, that takes each the encryption tactic and provides one other sinister ingredient: earlier than these recordsdata are encrypted, ransomware teams will steal them and threaten to publish them on the darkish net if a ransom is just not paid. The added stress from any such extortion is what has helped make ransomware so profitable.

Organisations want to grasp the worldwide context round us — the mix of pressured economic system, activism, and geopolitical tensions — to grasp the menace panorama. Focusing solely on the pure ‘technological’ half is just not sufficient to cut back the chance.

Key to danger discount is a proactive, preventive strategy. Getting visibility into the place your greatest areas of danger are, we name this publicity administration, is completely essential to understanding which doorways and home windows are large open and must be closed first. Risk actors are shifting shortly and making an attempt to detect and react to their motion is just not environment friendly as we speak. 

Source link

TAGGED: Cybersecurity, navigate, Trends
Share This Article
Twitter Email Copy Link Print
Previous Article US leadership must be ‘unchallenged’ US leadership must be ‘unchallenged’
Next Article Metal-free supercapacitor stack delivers 200 volts from just 3.8 cm³ Metal-free supercapacitor stack delivers 200 volts from just 3.8 cm³
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Velox Raises $38M in Funding Led by Fortissimo Capital

Co-founders (L-R) Marian Cofler (CEO) and Adrian Cofler (COO) Velox, a Kfar Saba, Israel-based developer,…

April 8, 2024

S64 Closes Series A Funding

S64 Ventures, a London, UK-based international alternate options fintech and options companion to the wealth…

July 29, 2024

Tile owner Life360 picks satellites over partnering with Apple or Google

Tile is promising satellite tv for pc connectivity for its Bluetooth trackers in a transfer…

May 13, 2024

Joule signs power deal for Utah Data Center

Joule Capital Companions, in collaboration with Caterpillar Inc. and Wheeler Equipment Co., has launched into…

August 8, 2025

Key Incidents and Lessons Learned

Equinix, as one of many largest knowledge middle operators globally, faces the continued problem of…

November 29, 2024

You Might Also Like

Cyber Security & Cloud Expo Global
Cloud Computing

Cyber Security & Cloud Expo Global 2026

By saad
Onsite virtualisation with Nexsan Unity and Vates VMS
Cloud Computing

Onsite virtualisation with Nexsan Unity and Vates VMS

By saad
IBM cites agentic AI, data policies, and quantum as 2026 trends
AI

IBM cites agentic AI, data policies, and quantum as 2026 trends

By saad
Amazon and Google team up to cut multicloud downtime
Cloud Computing

Amazon and Google team up to cut multicloud downtime

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.