Virtualization Technology News and Information
Article
RSS
Webroot 2015 Predictions: The Year of the Cloud Attack


 

Virtualization and Cloud executives share their predictions for 2015.  Read them in this VMblog.com series exclusive.

Contributed article by Mike Malloy, EVP of products and strategy at Webroot

2015: The Year of the Cloud Attack

Several cyber takedowns occurred this year when hackers infiltrated Home Depot, Michaels, iCloud, JP Morgan and the list just goes on. And while consumers and companies have been hit hard in 2014, 2015 will be the year of the cloud attack.

According to a recent IDC report, almost 90 percent of Internet spending (including mobile apps, big data and social media) will be on cloud-based technologies over the next six years.

While many companies are making the leap to the cloud, securing the cloud remains an ongoing challenge for IT departments. Smart cyber criminals know where the holes reside and view this space as a big target.

In 2015, a major cloud provider will be breached, compromising many of their customers' data and in turn leaving hundreds of thousands of individuals vulnerable to follow-on threats. Following the breach, I predict the following will occur: 

1.       U.S. Congress will step up efforts to legislate better security protection in public clouds.

2.       Consumer and shareholder outrage will lead to the sacking of several CEO's and CISO's and force the creation of internal cybersecurity task forces.

3.       Enterprises will recognize the benefits of cloud-based malware protection as well as cloud-based cyber attacks.

4.       Enterprises, government agencies and security vendors will begin to develop more effective collaboration and cooperation to combat the wave of cyber crime and cyber warfare.

##

About the Author

Mike Malloy is responsible for providing strategic and tactical direction to Webroot's product and business organizations. Malloy brings to Webroot more than 30 years of leadership experience with technology and financial services firms. Before joining Webroot, Malloy was vice president of marketing and sales for New Relic, where he was responsible for a tenfold increase in the company's customer base in a two-year period. Malloy previously held executive management roles for several leading companies including Wily Technology (now part of CA), where as chief marketing officer and senior vice president of product development he launched 35 new products and six major revisions of the company's flagship product. 
Published Friday, December 26, 2014 6:59 AM by David Marshall
Comments
UlfMattsson - December 27, 2014 8:13 AM

I agree that “While many companies are making the leap to the cloud, securing the cloud remains an ongoing challenge for IT departments. Smart cyber criminals know where the holes reside and view this space as a big target.”

I think that we urgently need better security for data in public cloud since IBM’s third annual Chief Information Security Officer (CISO) study reported "While concern over cloud security remains strong, close to 90% of respondents have adopted cloud or are currently planning cloud initiatives."

I found good news in a report that is addressing Security and Cloud, by Gartner last month. The report analyzed solutions for Data Protection and Data Access Governance and the title of the report is "Market Guide for Data–Centric Audit and Protection.”

The report concluded that "Organizations that have not developed data-centric security policies to coordinate management processes and security controls across data silos need to act."

Gartner also reviewed “Cloud Encryption Gateways”, providing encryption and tokenization before the data is sent to the cloud. Cloud encryption gateways typically provide a choice of various encryption and tokenization algorithms to meet the requirements of different data sensitivity levels.

I think it is time to re-think our security approach and be more data-centric.

Ulf Mattsson, CTO Protegrity

@VMblog - (Author's Link) - February 10, 2015 6:56 AM

Once again, how great is it to be a part of the virtualization and cloud industries? 2014 was another banner year, and we witnessed a number of fantastic technologies take shape and skyrocket. And I, along with many industry experts and executives, media

To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<December 2014>
SuMoTuWeThFrSa
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910