OPINION

  • All
  • Opinion
will-ai-replace-software-developers

Will AI replace software developers?

byTechnology Times Contributor
16/03/2023
0
101

financial-success-how-traders-can-step-up-games

How small businesses, traders can up their game for financial success

byTechnology Times Contributor
24/02/2023
0
105

why-change-management-matters-in-workplace

Why change management matters in evolving workspaces

byTechnology Times Contributor
24/02/2023
0
106

business-cybersecurity-strategy

Why humans should lead your business cybersecurity strategy

byTechnology Times Contributor
22/02/2023
0
123

chinenyen-mba-uzoukwu-convocation-lecture

Finding the Boundaries of the Possible, Venturing Beyond | UNILAG Convovocation Lecture by Chinenye Mba-Uzoukwu

byTechnology Times Contributor
21/02/2023
0
125

how-to-spot-online-romance-scams

From dating to defrauding: Online romance scams surge as criminals cash in on lonely hearts

byTechnology Times Contributor
08/02/2023
0
111

malware-cybercrime-trends-2023-emmanuel-asika

Rise of ₦7,000 malware kits and cybercrime trends coming our way in 2023

byTechnology Times Contributor
02/02/2023
0
118

cloud-security-whose-fault-is-it

Cloud Security: Whose fault is it? 

byTechnology Times Contributor
31/01/2023
0
112

ryan-mer-on-fraud-trends-2023

‘It’s easier to hack people than to hack machines’ and other frauds trends every CFO should know 

byTechnology Times Contributor
31/01/2023
0
111

kaspersky-chatgpt-will-influence-cybersecurity

Kaspersky: How ChatGPT will influence cybersecurity

byTechnology Times Contributor
25/01/2023
0
116

technology-bolster-africas-growth-moses-muthui

How technology can bolster Africa’s growth and competitiveness

byTechnology Times Contributor
25/10/2022
0
113

cloud-services-bring-automation-to-printing

Cloud services can bring the benefits of automation to every print business

byTechnology Times Contributor
12/10/2022
0
132

Load More
  • Home
  • BIG STORY
  • Digital Transformation Series
  • ARTICLE SECTIONS
    • Tech News
    • Consumer Tech
    • Opinion
    • Interviews
    • Tech Market Updates
    • Promoted
Friday, March 24, 2023
No Result
View All Result
  • Login
Technology Times
Technology Times
No Result
View All Result
Home Opinion

Cloud Security: Whose fault is it? 

Technology Times ContributorbyTechnology Times Contributor
31/01/2023
in Opinion
Reading Time: 4 mins read
1 0
A A
0
cloud-security-whose-fault-is-it

Marilyn Moodley is the Country Leader for South Africa and WECA (West, East, Central Africa), SoftwareOne.

ADVERTISEMENT
Share on FacebookShare on TwitterShare on LinkedinShare on WhatsAppShare on Telegram

Cloud security requires vigilance. Marilyn Moodley, Country Leader for South Africa and WECA (West, East, Central Africa), SoftwareOne explains ways to avoid failures in the cloud.

At least 95% of cloud security failures in the next three years will be the customer’s fault, according to Gartner. Unsurprisingly, the biggest threat to security is people. Misconfiguration mistakes escalated from 15% of exploitable errors in 2018 to more than 40% in 2021 and human error is now the third most common cause of security breaches, ahead of malware and right up there with social engineering and hacking. Complacency about cloud security is a major contributing factor, but this needs to change. Most cloud services operate under a shared responsibility model in which providers secure the infrastructure, while customers are required to lock down the software stack and applications. In other words, responsibility for patching vulnerabilities and controlling access to cloud accounts still lies with the user.

What does this mean? Organisations need to remain vigilant, ensuring that they take the necessary steps and precautions to secure their data and identities if they’re to avoid becoming an unfortunate statistic with no one to blame but themselves.

Identify, verify, control

Related Articles

Will AI replace software developers?

How small businesses, traders can up their game for financial success

Why change management matters in evolving workspaces

Why humans should lead your business cybersecurity strategy

Finding the Boundaries of the Possible, Venturing Beyond | UNILAG Convovocation Lecture by Chinenye Mba-Uzoukwu

Load More

No matter the deployment model, sufficient controls are required to govern access and usage. With such a variety of effective Identity and Access Control service providers available today, there is little excuse for businesses not to have these measures in place. Authentication and access control requires users to verify their identity, and secures their access to resources across cloud, SaaS, on-prem and APIs, while increasing speed, agility, and efficiency.

Such IAM solutions make it straightforward to provide the means for customers, employees and partners to all have secure access to the necessary resources. By using identity verification and access control services located in the cloud, the limitations and costs associated with on-premises IAM can be replaced by a more flexible, scalable solution. Cloud IAM is key to ensuring security outside of network perimeters and capabilities include authentication, access management, identity verification, consent collection, risk management and API security.

Access control to the cloud should be regulated through the creation of centralised rules and policies to streamline processes. The use of Multi-Factor Authentication (MFA) is critical to ensure the correct identification of individuals trying to access networked resources, while Privileged Access Management (PAM) tools enforce control over sensitive components and applications in the environment.  These tools form part of a larger cloud security picture that includes details such as a zero trust framework, bolstered with cybersecurity mesh, and reinforced with Secure Access Service Edge (SASE).

Zero trust: never trust, always verify

Zero trust is a framework for securing organisations in cloud and mobile spaces by insisting that no user or application be trusted by default. It enables least-privileged access, establishes trust based on context which is informed by user identity and location, endpoint security posture as well as the app or service being requested, while performing necessary policy checks at each step. A well-tuned zero trust architecture leads to simpler network infrastructure, a better user experience, and improved cyber threat defense.

SASE: borderless security

Secure access service edge (SASE) is a framework for network architecture that brings cloud native security technologies together with wide area network (WAN) capabilities to securely connect users, systems, and endpoints to applications and services anywhere. This ensures that data and traffic is secured, no matter where it travels.

Cybersecurity MESH: closing the gaps

Gartner describes cybersecurity mesh as “a flexible, composable architecture that integrates widely distributed and disparate security services”. Concerned with strengthening digital security while bringing tools closer to the assets they’re designed to defend, a cybersecurity mesh architecture (CSMA) encourages organisations to deploy solutions that fit their specific needs by working within their integrated ecosystems. This enables businesses to share cybersecurity intelligence, automate and coordinate responses to threats, and simplify their security operations. CSMA offers a distributed identity fabric that helps establish trusted access across all applications, customers, partners, and workforces.

Achieving visibility and developing security skill sets

Visibility in cloud security means eliminating blind spots that can result in overspending, performance inefficiencies and security complications. This is done through service-centric or role-centric tools, rather than host-centric tools to manage networks. If it is not possible to hire the necessary competencies, organisations will have to develop them. Many vendors offer online resources to help technologists learn the skills they need to become cloud security engineers. In addition to an increase in the need to cultivate the necessary skills, there will be an increase in demand for technologists that have the DevOps skills necessary to align business workloads with the cloud.  Upskilling will also be critical to bridging the skills gap which includes training business teams on how to use cloud tools.

Owning security responsibility

Accordingly, it’s important for businesses to remember that even when they’re purchasing infrastructure, software or functionality as a service, they’re not outsourcing total responsibility for security. This will continue to be a shared responsibility, because it is unlikely that service providers would willingly take on the possibility of being liable for human action or error beyond their control. As such, organisations will need to prioritise the acquisition of or the development of necessary security-minded skills in order to protect their digital assets from cyber harm.

About author: Marilyn Moodley is the Country Leader for South Africa and WECA (West, East, Central Africa), SoftwareOne.

Share20Tweet13Share4SendShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe
ADVERTISEMENT
Technology Times Contributor

Technology Times Contributor

Related Articles

will-ai-replace-software-developers
Opinion

Will AI replace software developers?

byTechnology Times Contributor
16/03/2023
0
101

Since its launch in November last year, the artificial intelligence (AI)...

Read more

How small businesses, traders can up their game for financial success

Why change management matters in evolving workspaces

Why humans should lead your business cybersecurity strategy

Finding the Boundaries of the Possible, Venturing Beyond | UNILAG Convovocation Lecture by Chinenye Mba-Uzoukwu

From dating to defrauding: Online romance scams surge as criminals cash in on lonely hearts

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

4 × four =

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

LATEST ARTICLES

5g-airtel-makes-5g-growth-drivers-league

5G: Airtel makes league to drive market growth to $792.7b

23/03/2023
identity-and-access-management-market

Identity and Access Management market to reach $53.1b by 2032

23/03/2023
aws-fintech-africa-accelerator-opens

AWS FinTech Africa Accelerator opens, targets African talents

23/03/2023
nigeria-cyber-attacks-peak-during-guber-polls

Minister: Cyber attacks crossed 3.8m during Guber polls

22/03/2023
ixpn-lowers-bandwidth-cost-nigeria

NCC: IXPN now drives higher bandwidth at lower cost in Nigeria

22/03/2023
ADVERTISEMENT
ADVERTISEMENT

Popular News

  • inec-suffered-cyber-attack-nigeria-computer-society

    Presidential Election 2023: INEC server suffered cyber attack, was not robust, Nigeria Computer Society says

    101 shares
    Share 40 Tweet 25
  • PC: How to spot symptoms of CPU failure

    134 shares
    Share 54 Tweet 34
  • Elon Musk bows to NCC order to charge Starlink Nigeria subscribers in Naira

    86 shares
    Share 34 Tweet 22
  • Nigeria General Election 2023: Buhari sets up cybersecurity team as 622 hotline goes live

    61 shares
    Share 24 Tweet 15
  • NCC: Nigeria lost 9m phone lines over Minister’s SIM registration order 

    59 shares
    Share 24 Tweet 15

Recommended

  • Tech News
nigeria-cyber-attacks-peak-during-guber-polls

Minister: Cyber attacks crossed 3.8m during Guber polls

22/03/2023
106
ixpn-lowers-bandwidth-cost-nigeria

NCC: IXPN now drives higher bandwidth at lower cost in Nigeria

22/03/2023
103
harmonised-short-codes-nigeria

Harmonised Short Codes: Mobile operators get May 17 deadline

22/03/2023
101
mba-uzoukwu-inec-sowed-tech-distrust-nigeria

Mba-Uzoukwu: With 2023 General Election, INEC sowed seeds of technology distrust in Nigerians  

20/03/2023
110
nigeria-hit-by-cyber-threats-election-day

Minister: Nigeria hit by 6,997,277 cyber threats on Presidential election day

15/03/2023
107
starlink-nigeria-under-mtn-nigeria-watch-ceo

Starlink: MTN Nigeria places new ‘competitor’ under close watch, CEO says  

14/03/2023
106
Load More
ADVERTISEMENT
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

Technology Times

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Contct Us

LEGAL & COMPLIANCE

Home

Privacy Policy

Terms & Conditions

Disclaimer

Guest Post Guidelines

 

TOP ARTICLES

  • oswald-guobadia-on-nigerian-startup-act-2022

    Guobadia, President’s Digital Transformation SSA, says new Nigerian Startup Act 2022 is ‘welcome initiative that will address japa 100%’

    149 shares
    Share 60 Tweet 37
  • PC: How to spot symptoms of CPU failure

    134 shares
    Share 54 Tweet 34
  • LAGOS | Website to verify vehicle numbers now live

    123 shares
    Share 49 Tweet 31
  • WhatsApp users in Nigeria ‘hit by new virus spreading across Africa’

    106 shares
    Share 42 Tweet 27
  • Presidential Election 2023: INEC server suffered cyber attack, was not robust, Nigeria Computer Society says

    101 shares
    Share 40 Tweet 25

ITU PP-22: Watch Ministers from Nigeria, 99 Member States deliver policy statements

w

©2022 Technology Times is powered by Digital Transformation Media Limited, Nigeria.

No Result
View All Result
  • Home
  • Offline with Shina Badaru
  • Analysis
  • Interviews
  • Big Story
  • Columns
  • Tech @ Work
  • Digital Transformation Series

©2022 Technology Times is powered by Digital Transformation Media Limited, Nigeria.

Welcome Back!

OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Go to mobile version