Cloud

1/26/2018
11:28 AM
50%
50%

Endpoint and Mobile Top Security Spending at 57% of Businesses

Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.

There is a disconnect between businesses' ideal security practices and their actual strategies. Some 77% of companies cite data-at-rest security tools as the most effective for preventing breaches but fall toward the bottom (40%) of security spending priorities, new data shows.

In its 2018 Data Threat Report, Thales teamed up with 451 Research to poll 1,200 senior security execs around the world. They discovered 94% of respondents use sensitive data in the cloud, big data, IoT, container, blockchain, and/or mobile environments. Forty-four percent say they feel "very" or "extremely" vulnerable to data security threats.

For 57% of businesses, the bulk of security budgets goes toward endpoint and mobile security technologies, followed by analysis and correlation tools (50%). The disconnect extends to encryption, which many cite as important but don't allocate spending toward encryption tech.

Forty-two percent of respondents use more than 50 SaaS applications, 57% use three or more IaaS vendors, and 53% use three or more PaaS environments. Nearly half (44%) cite encryption as the top tool for increased cloud usage; 35% say it's a necessary part of big data adoption. Encryption is also cited as the top tool for securing IoT (48%) and container (41%) deployments.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/28/2018 | 7:48:35 PM
Data at rest encryption
> "Some 77% of companies cite data-at-rest security tools as the most effective for preventing breaches but fall toward the bottom (40%) of security spending priorities, new data shows."

Makes sense to the extent that we know that eating a lot of vegetables and as little sugar as possible is good for us, but that that "knowledge" is not reflected in our grocery shopping.

Data-at-rest encryption, at the same time, is a bit controversial because fundamentally, arguably, credentials/authorization matter much more -- not to mention that encryption has been argued to potentially hinder accessibility to the point of potential compliance issues ( as I've observed here: securitynow.com/author.asp?section_id=613&doc_id=739452 ).
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1848
PUBLISHED: 2018-12-14
IBM Business Automation Workflow 18.0.0.0 and 18.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ...
CVE-2018-1977
PUBLISHED: 2018-12-14
IBM DB2 for Linux, UNIX and Windows 11.1 (includes DB2 Connect Server) contains a denial of service vulnerability. A remote, authenticated DB2 user could exploit this vulnerability by issuing a specially-crafted SELECT statement with TRUNCATE function. IBM X-Force ID: 154032.
CVE-2018-18006
PUBLISHED: 2018-12-14
Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.
CVE-2018-18984
PUBLISHED: 2018-12-14
Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and PHI.
CVE-2018-19003
PUBLISHED: 2018-12-14
GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e Versions 03.03.28C to 05.02.04C, EX2100e All versions prior to v04.09.00C, EX2100e_Reg All versions prior to v04.09.00C, and LS2100e All versions prior to v04.09.00C The affected versions of the application have a path traversal vulnerability that fails...