The Threat Against Cloud Storage: Protecting Digital Systems

Cloud storage has revolutionized the data space. This managed service offers a range of benefits including cost savings, improved data accessibility, and offering robust backup and recovery options. With this however, cloud environments are also becoming more complex and challenging for businesses. Having all this sensitive information in the cloud could be a vulnerable target for cyber attacks if we don’t properly secure our data in the cloud. To address these risks, it is paramount that companies ensure their security measures are strong.  An article on Technology Magazine shared by tech expert Amber Jackson shares the insights of executives from KPMG, IBM, Kyndryl and Persistent Systems as they comment how the current cybersecurity landscape is evolving in line with cloud storage developments.

Adapting to a changing security landscape. “The cloud landscape keeps changing and becoming more complex, with legacy systems unable to handle today’s new threat environments. With AI adoption continuing to rise and data being central to enterprise success, data security is becoming a more significant concern for businesses. In response, the security landscape is evolving in tandem with these cloud storage concerns, with organizations moving to protect the data of its workforce and clients. As Nataraj Nagaratnam, Global CTO for Cloud Security at IBM, explains, concerns like data theft are currently a leading cloud security threat. ‘Effectively addressing and preventing data theft requires a data-centric security, compliance and resilience strategy,’ he says. ‘Cloud providers have a responsibility to not only monitor the threat landscape but provide their clients with the necessary technology to protect the data they are entrusted with.’ Additionally, Ben Scowen, Vice President UK&I Cloud & Core Leader at Kyndryl, notes that businesses must evolve to embrace new cloud-based technologies – which involves changing the benchmarks for security. ‘The cybersecurity landscape has significantly expanded to accommodate evolving IT environments,’ he explains. ‘Although organizations have invested in layered, in-depth security point solutions, the siloed approach makes it difficult to grapple with the growing sophistication and frequency of cyberattacks.'”

Embracing data regulations. “‘We have moved into a data-centric world,’ Nataraj explains. “Enterprises need to stay on top of regulations that focus on data privacy and data resilience. As businesses attempt to manage the complex regulatory landscape, they can employ a sovereign cloud approach to ensure their data can remain in-country, up and running at all times, assure data privacy or comply with the latest regulations.” Additionally, Scowen notes that businesses need to be mindful of these regulations when they’re designing or implementing new systems, ensuring they adopt a “secure by design” mindset. ‘Data protection in data processing procedures is best adhered to when it is already integrated into the technology.'”

Leveraging cloud storage to gain insights. “With a robust data foundation, businesses can leverage analytics to gain insights from data sources such as the Internet of Things (IoT). ‘IoT devices collect huge amounts of data, only some of which is ordinarily used for analytics,’ explains Adrian Bradley, Head of Cloud Transformation at KPMG. ‘Cloud storage and analytics hold the key to unlocking the valuable insights in this data. This may be on pricing, customer behaviour and competitors, while also supporting preventative measures against fraud and ransomware.’ However, having a clear cybersecurity strategy remains important to protect sensitive IoT data that can be exploited. ‘Choosing the right cloud service provider is key, ensuring businesses can efficiently store, manage, and access vast amounts of data,’ Barath Narayanan, Global BFSI and Europe Geo Head at Persistent Systems, suggests. ‘Optimizing data placement ensures that information is stored as close as possible to where it will be processed, minimizing latency and enhancing overall system performance.’

 

For Full Article, Click Here

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *