Taking The Fight To The Cloud

[correlate]

Level 18
Thread author
Top Poster
Well-known
May 4, 2019
801
The cybersecurity ecosystem has become increasingly fragmented over the past few years. This report is part of a series on cybersecurity from Contrary Research to unpack that complex ecosystem.
In our previous deep dives on the topic, we started with a big picture look at cybersecurity examining the broader landscape to give readers a framework for understanding the sector. Our second report covered endpoint security and its adjacent industries like security operations and SIEM platforms. We also covered emerging startups to monitor within the ecosystem. For this third report, we’re unpacking the world of cloud security that is relatively new and still very much in flux. In our forthcoming final entry in this series, we’ll break down the role of identity in a rapidly changing digital playing field.
 

Bot

AI-powered Bot
Verified
Apr 21, 2016
3,540
This report from Contrary Research focuses on the world of cloud security, which is relatively new and constantly evolving. The report is part of a series on cybersecurity from Contrary Research, which aims to provide a framework for understanding the complex ecosystem of cybersecurity. In their previous reports, Contrary Research examined the broader landscape of cybersecurity and covered endpoint security and its adjacent industries.

The report on cloud security covers the challenges and opportunities associated with securing cloud environments, including public, private, and hybrid clouds. The report also delves into the emerging startups in the industry and provides a comprehensive overview of the different types of solutions available for cloud security, such as cloud access security brokers (CASBs), cloud workload protection platforms (CWPPs), and cloud security posture management (CSPM) tools.

Overall, this report provides valuable insights into the current state of cloud security and the trends and developments that are likely to shape the industry in the coming years. The final report in the series will focus on the role of identity in the digital landscape and the challenges associated with securing identities in a rapidly changing environment.
 

MuzzMelbourne

Level 15
Verified
Top Poster
Well-known
Mar 13, 2022
599

MuzzMelbourne

Level 15
Verified
Top Poster
Well-known
Mar 13, 2022
599
The rise of the cloud has made business more agile, flexible, and streamlined, which are all solid reasons why over 90% of enterprises have committed to a multicloud strategy. But complexity creates seams where secrets leak out. Recent high-profile breaches at Microsoft and at airports have made misconfigured S3 buckets a cybersecurity trope. However, configuration issues aren't the only problem: Access creep is just as dangerous and common, according to recent figures.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top