Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/6/2016
02:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

PwC Study Finds Greater Trust In Cloud, More Security Spend

Businesses are more comfortable with the cloud and have increased their security spending, but still face a shortage of skilled cybersecurity workers.

A new global study shows a rise in security spending and in privacy and security awareness training programs.

The 2017 Global State of Information Security Survey, conducted by PwC, surveyed more than 10,000 business and IT execs to learn about their current and future plans for protecting digital assets amid rising security risks.

David Burg, US and global leader for cybersecurity and privacy at PwC, says the biggest takeaway from this survey was companies' overall change in attitude toward technology.

"After initially seeing technology as a threat, organizations are now adopting technology to manage threats and achieve competitive advantages," which is a significant shift, he says.

"Many organizations no longer view cybersecurity as a barrier to change or as an IT cost, but instead how cybersecurity solutions can facilitate business growth, create market advantages, and build brand trust."

More organizations are moving sensitive business processes to the cloud, the study found. Burg explains that this transition is a sign that businesses are gaining trust in the cloud and viewing it as an enabler rather than a threat. 

Sixty-three percent of respondents have moved IT functions to the cloud and 34% have moved customer service to the cloud. About one-third of organizations also entrust finance and operations to cloud providers.

More companies are beginning to implement biometric authentication like fingerprint scanning and facial recognition to add extra security and improve trust among both customers and business partners, says Burg. More than half (57%) of respondents use biometric authentication.

"In the past, advanced authentication was primarily the technological domain of government systems and large financial institutions or, more recently, social media and consumer email providers," he continues. "But now a broader range of sectors are adopting multi-factor authentication across a range of transactions."

As organizations use more data, they are also challenged by the industry-wide lack of cybersecurity talent, Burg notes. This is driving more businesses to rely on third-party services for their security programs.

Sixty-two percent of survey respondents report using managed security services for privacy and cybersecurity. More than half (53%) use open-source software, and among these, 49% report this has had a positive effect on their cybersecurity posture.

Security spending is poised to grow as businesses become more digital, says Burg. Already, 59% of respondents report increasing their cybersecurity spending as a result of digitizing their business ecosystem.

"Cybersecurity has assumed a role in the foundation of business strategy instead of an add-on to an existing plan or product," he explains. "Because of this, the value of cybersecurity will only continue to increase as more organizations see what was once viewed as a risk being turned into possible solutions."

Businesses working to improve their security posture should prioritize employee awareness of security practices. More than half (56%) of survey respondents currently require employees to do privacy training. The most-cited priority over the next year is privacy training and security awareness.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
CVE-2021-32554
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.