Sunday, 1 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Navigating the latest cybersecurity trends
Cloud Computing

Navigating the latest cybersecurity trends

Last updated: September 17, 2024 9:40 am
Published September 17, 2024
Share
Cloud Computing News
SHARE

As organisations worldwide proceed to grapple with an ever-expanding menace panorama, understanding the most recent cybersecurity tendencies has by no means been extra essential.

Forward of Cyber Security & Cloud Expo Europe, Bernard Montel, EMEA Technical Director and Safety Strategist at Tenable, make clear the shifts in cybersecurity over the previous 5 years and affords worthwhile insights into the challenges and tendencies shaping the business at the moment.

Within the face of more and more refined threats, Montel’s views on danger administration, proactive safety measures, and the function of rising applied sciences like AI in cybersecurity supply invaluable steering for navigating these turbulent waters.

Cloud Tech: How has the cybersecurity panorama modified within the final 5 years?

Bernard Montel: The worldwide pandemic dramatically modified the best way we work and for some organisations this transition occurred virtually in a single day. As a substitute of travelling to workplaces or different locations of labor we had been connecting to programs and assets remotely. 

From a cybersecurity standpoint this has had an enormous impression in the best way we want to consider safety:

  • The house community, which had by no means been secured, all of a sudden grew to become an extension of the company community. House routers had been the one approach staff may achieve entry to assets and expanded the menace panorama considerably.
  • The usage of Digital Personal Networks (VPNs) and multi-factor authentication (MFA) was the one technique to safe these connections.
  • As organisations moved assets to the cloud, negating the necessity for VPNs, it simplified life for distant employees and offered a layer of safety for organisations.

If we may retain one single post-pandemic change, it’s the acceleration of cloud companies (Software program-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and so forth.) The cloud has modified the best way we work at the moment eradicating the necessity for bodily racks of machines, accessible solely remotely. There isn’t any should be hardwired to the company community to be safe.

See also  Data Center Trends to Watch in 2025: Expert Predictions

In fact we nonetheless have some on-prem options deployed and used. Nonetheless, the overwhelming majority of organisations function a hybrid setting, combining a mix of personal and public cloud with on-prem assets. 

Immediately’s new regular means the “citadel” represented by the “company community,” is now fragmented—with the end result that the assault floor has by no means been so massive or extra dynamic.   

CT: What are the most recent cybersecurity tendencies?

BM: Ransomware continues to be the highest menace at the moment. The variety of assaults skilled by organisations day by day is rising and breaches are breaking increasingly more data when it comes to variety of data breached or quantity of knowledge exfiltrated.

Cloud safety is one other actual problem for all organisations. The transfer to cloud assets forces safety groups to rethink the best way they deal with safety. As well as, IoT gadgets linked to the cloud additional extends the assault floor. The standard perimeter strategy, with endpoint and/or server the main target of safety practices, is sort of ineffective once we are speaking about serverless microservices, and containers.

Identification has returned as the primary focus of concern. 25 years in the past we talked in regards to the problem of managing identities with the start of I&AM. The issue continues to be very a lot evident, however way more advanced: federated identities, MFA, Energetic Listing and EntraID, mixed with all of the cloud-based identities with AWS, Azure, GCP… the record goes on.

AI is, in fact, like in every other expertise, one other space of focus. Attackers are simply starting to grasp the capabilities it affords and, as defenders, it’s important we additionally decide find out how to utilise the expertise. 

See also  Navigating Scope 3 Emissions for Sustainable Data Center Operations

Harnessing the ability and pace of generative AI – equivalent to Google Vertex AI, OpenAI GPT-4, LangChain, and plenty of others – it’s potential to return new clever data in minutes. This can be utilized to speed up analysis and growth cycles in cybersecurity, to seek for patterns and clarify what’s discovered within the easiest language potential. Harnessing the ability of AI allows safety groups to work sooner, search sooner, analyse sooner, and in the end make choices sooner.

CT: What ought to organisations remember at the moment when considering of their safety dangers?

BM: What we want to bear in mind is that, within the majority of situations, it’s a recognized vulnerability that enables menace actors an entry level to the organisation’s infrastructure. Having gained entry menace actors will then look to additional infiltrate the organisation to steal information, encrypt stems or different nefarious actions. 

Non-malicious misconfigurations – so primary human error, from configurations left ‘by default’ to a developer submitting code by a DevOps excessive pace cycle – these errors are human. Nonetheless, not checking for these misconfigurations leaves the doorways huge open to attackers. 

Typically there’s a perception that, as a result of an organisation is ‘smaller,’ they gained’t be a goal for assaults. That couldn’t be farther from the reality. Sure, sometimes it’s the large names that make the headlines, however more and more smaller organisations are additionally focused as menace actors realise that they’re a part of the provision chain and sometimes open the door – given the interconnected working practices – to bigger corporations. 

See also  Best cross-tenant migration tool: Securing enterprise cloud transitions

Ten years in the past a ransomware assault was actually apparent. The pc was bricked with a ransomware demand displayed on the display. Immediately, assaults are much less apparent and may go undetected for just a few weeks as menace actors look to obfuscate their presence permitting them to creep round infrastructure for nefarious functions.

Ransomware gangs will make use of double extortion strategies, that takes each the encryption tactic and provides one other sinister component: earlier than these information are encrypted, ransomware teams will steal them and threaten to publish them on the darkish net if a ransom shouldn’t be paid. The added strain from one of these extortion is what has helped make ransomware so profitable.

Organisations want to know the worldwide context round us — the mix of pressured financial system, activism, and geopolitical tensions — to know the menace panorama. Focusing solely on the pure ‘technological’ half shouldn’t be sufficient to scale back the chance.

Key to danger discount is a proactive, preventive strategy. Getting visibility into the place your largest areas of danger are, we name this publicity administration, is totally important to understanding which doorways and home windows are huge open and should be closed first. Menace actors are shifting rapidly and attempting to detect and react to their motion shouldn’t be environment friendly at the moment. 

Tenable might be sharing extra of their experience at this yr’s Cyber Security & Cloud Expo Europe. Swing by Tenable’s sales space at stand #144 to listen to extra about preserving your corporation safe.

Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: AI, synthetic intelligence, cloud, cyber safety, cybersecurity, enterprise, generative AI, hacking, Hybrid Cloud, non-public cloud, Public Cloud, Safety, tenable, tendencies

Source link

TAGGED: Cybersecurity, Latest, Navigating, Trends
Share This Article
Twitter Email Copy Link Print
Previous Article Addressing the AI-driven surge in data centre power demand Using AI to plug security gaps
Next Article edge AI Driving the next wave of technological advancements
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Successfully accelerating ERP-cloud adoption – Data Centre Review

The demand for cloud-based ERP techniques is gaining tempo all through the general public sector.…

February 26, 2024

Generative AI use soars among brits, but is it sustainable?

A survey by CloudNine PR exhibits that 83% of UK adults are conscious of generative…

November 27, 2024

Google commits to 1000x more AI infrastructure in next 4-5 years

With a purpose to meet the huge demand for AI, Google needs to double the…

November 29, 2025

Remodel Health Raises More Than $100M

Remodel Health, an Indianapolis, IN-based particular person protection well being reimbursement association (ICHRA) supplier for…

December 19, 2024

NETSCOUT’s InfiniStreamNG revolutionizes energy efficiency in data centers

NETSCOUT SYSTEMS, INC. has revealed that the environment friendly design and structure of its InfiniStreamNG…

July 28, 2025

You Might Also Like

What is Famous Labs? Building an autonomous creation ecosystem
Cloud Computing

What is Famous Labs? Building an autonomous creation ecosystem

By saad
Thomson Reuters, RBC embed AI into enterprise cloud workflows
Cloud Computing

Thomson Reuters, RBC embed AI into enterprise cloud workflows

By saad
Tune Talk’s cloud-native shift shows telecom becoming software-driven
Cloud Computing

Tune Talk’s cloud-native shift signals software-driven telecom

By saad
Genesys prepares EU deployment on AWS European Sovereign Cloud
Cloud Computing

Genesys plans EU deployment on AWS European Sovereign Cloud

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.