Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/23/2018
02:30 PM
50%
50%

New Survey Shows Hybrid Cloud Confidence

Executives are mostly confident in their hybrid cloud security, according to the results of a new survey.

A new survey of executives shows that the vast majority are deploying hybrid cloud architectures for their organization. When queried about the state of their IT security, the breakdown is interesting: Half say it's healthy, one-quarter have some level of concern, and one-quarter seem to be at best overconfident, at worst delusional. More on that, shortly.

The survey, sponsored by Cavirin Systems, asked executives about how they were building their application architectures for the business. Roughly 80% say that they are building hybrid clouds, with half of those saying that Microsoft Azure is part of their infrastructure.

When the survey turned to how they are protecting the applications and workloads on those hybrid clouds, 40% say that they rely solely on the tools available through the cloud provider. Among the rest, respondents listed cloud workload protection systems (CWPP), CASB, and SIEM tools as part of their security platforms. Nearly two-thirds say that cloud and on-premise systems are protected by entirely separate security tools.

With the diversity of approaches and tools, 53% of those responding say that their cybersecurity posture is "healthy." Another 23% say that their cybersecurity health is on the spectrum between average and terrible. A confident 23% describe their cybersecurity health as "impenetrable." History suggests that those in the final group might be wrong.

For more, read here.

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Phishing Campaign Targets 200M Microsoft 365 Accounts
Kelly Sheridan, Staff Editor, Dark Reading,  12/7/2020
Navigating the Security Maze in a New Era of Cyberthreats
Keith B. Alexander & Jamil Jaffer, Founder & SVP, Strategy, Partnerships & Corporate Development, IronNet Cybersecurity,  12/9/2020
Nation-State Hackers Breached FireEye, Stole Its Red Team Tools
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today’s Enterprises
Assessing Cybersecurity Risk in Today’s Enterprises
COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8919
PUBLISHED: 2020-12-10
An information leak vulnerability exists in Gerrit versions prior to 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where a missing access check on the branch REST API allows an attacker with only the default set of priviledges to read all other user's personal account data as well as sub-trees with restri...
CVE-2020-8920
PUBLISHED: 2020-12-10
An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an attacker to get read access to all users' person...
CVE-2020-29666
PUBLISHED: 2020-12-10
In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory-listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value.
CVE-2020-29667
PUBLISHED: 2020-12-10
In Lan ATMService M3 ATM Monitoring System 6.1.0, a remote attacker able to use a default cookie value, such as PHPSESSID=LANIT-IMANAGER, can achieve control over the system because of Insufficient Session Expiration.
CVE-2020-29668
PUBLISHED: 2020-12-10
Sympa before 6.2.59b.2 allows remote attackers to obtain full SOAP API access by sending any arbitrary string (except one from an expired cookie) as the cookie value to authenticateAndRun.