Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:40 PM
Connect Directly

PwC Study Finds Greater Trust In Cloud, More Security Spend

Businesses are more comfortable with the cloud and have increased their security spending, but still face a shortage of skilled cybersecurity workers.

A new global study shows a rise in security spending and in privacy and security awareness training programs.

The 2017 Global State of Information Security Survey, conducted by PwC, surveyed more than 10,000 business and IT execs to learn about their current and future plans for protecting digital assets amid rising security risks.

David Burg, US and global leader for cybersecurity and privacy at PwC, says the biggest takeaway from this survey was companies' overall change in attitude toward technology.

"After initially seeing technology as a threat, organizations are now adopting technology to manage threats and achieve competitive advantages," which is a significant shift, he says.

"Many organizations no longer view cybersecurity as a barrier to change or as an IT cost, but instead how cybersecurity solutions can facilitate business growth, create market advantages, and build brand trust."

More organizations are moving sensitive business processes to the cloud, the study found. Burg explains that this transition is a sign that businesses are gaining trust in the cloud and viewing it as an enabler rather than a threat. 

Sixty-three percent of respondents have moved IT functions to the cloud and 34% have moved customer service to the cloud. About one-third of organizations also entrust finance and operations to cloud providers.

More companies are beginning to implement biometric authentication like fingerprint scanning and facial recognition to add extra security and improve trust among both customers and business partners, says Burg. More than half (57%) of respondents use biometric authentication.

"In the past, advanced authentication was primarily the technological domain of government systems and large financial institutions or, more recently, social media and consumer email providers," he continues. "But now a broader range of sectors are adopting multi-factor authentication across a range of transactions."

As organizations use more data, they are also challenged by the industry-wide lack of cybersecurity talent, Burg notes. This is driving more businesses to rely on third-party services for their security programs.

Sixty-two percent of survey respondents report using managed security services for privacy and cybersecurity. More than half (53%) use open-source software, and among these, 49% report this has had a positive effect on their cybersecurity posture.

Security spending is poised to grow as businesses become more digital, says Burg. Already, 59% of respondents report increasing their cybersecurity spending as a result of digitizing their business ecosystem.

"Cybersecurity has assumed a role in the foundation of business strategy instead of an add-on to an existing plan or product," he explains. "Because of this, the value of cybersecurity will only continue to increase as more organizations see what was once viewed as a risk being turned into possible solutions."

Businesses working to improve their security posture should prioritize employee awareness of security practices. More than half (56%) of survey respondents currently require employees to do privacy training. The most-cited priority over the next year is privacy training and security awareness.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-23
Upwork Time Tracker doesn't verify the SHA256 hash of the downloaded program update before running it, which could lead to code execution or local privilege escalation by replacing the original update.exe.
PUBLISHED: 2019-07-23
GNUBOARD5 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.
PUBLISHED: 2019-07-23
Jsish 2.4.84 2.0484 is affected by: Reachable Assertion. The impact is: denial of service. The component is: function Jsi_ValueArrayIndex (jsiValue.c:366). The attack vector is: executing crafted javascript code. The fixed version is: after commit 738ead193aff380a7e3d7ffb8e11e446f76867f3.
PUBLISHED: 2019-07-23
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thre...
PUBLISHED: 2019-07-23
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supp...