Democrats to Take Charge of Federal Cybersecurity in Election Aftermath
… need training on innovative programs and solutions, she said.
“Cybersecurity providers can definitely initiate the training,” Gurinaviciute said. “Collaboration is the root cause for innovation. And thus, cybersecurity training would take into consideration latest trends, objections and industry standards.”
Cloud Identity and Access Management to Plague Businesses This Year
Cloud identity and access management (IAM) will be a big problem area in the coming year, even for mature organizations, according to Rapid7.
That’s because cloud IAM is very complex and presents more opportunities to make mistakes. In addition, there are many overlapping layers of access. And everything has an identity, including users, resources and applications. That presents a gap in security.
Chris DeRamus is vice president of technology at Rapid7 Cloud.
“As cloud adoption becomes more mainstream, we will see more repetitions of mistakes made in the past,” he said.
Organizations are incorrectly configuring databases, storage containers and other cloud services, DeRamus said. And they’re setting permissions too broadly, allowing anyone access.
Businesses will need to take a proactive approach to their cloud security, he said. And they should work toward implementing least-privileged access.
Companies can start by using behavior analytics and automated cloud security tools to adjust privileges to include – but not exceed – the needs of a role, DeRamus said. They’ll then be able to understand and better control access in their cloud environments.
A gap in security can be detrimental for a company, Johnson said. It costs time, resources and a loss of brand trust for consumers.
Gaps in security can also lead to a loss of control, which makes it hard to track threats and events.
“Some organizations might not even know a threat has occurred until weeks or months after an event,” DeRamus said. “Organizations should implement a continuous and automated cloud security solution for full visibility into their cloud environment, and to detect and remediate threats such as misconfigurations and compliance violations, in real time.”
Companies can either automate the remediation of those vulnerabilities or alert the appropriate personnel of the issue before a devastating data leak or breach occurs, he said.
Ingram Micro EMEA Beefs Up Cybersecurity Portfolio with AppGuard
Ingram Micro EMEA has broadened its cybersecurity portfolio to include AppGuard zero trust endpoint protection.
AppGuard’s software controls the behavior of applications and stops malware attacks prior to launch with its autonomous policy engine.
“In 2020, the COVID-19 pandemic has transformed our entire global ecosystem with its massive effect on the global workforce and interconnectivity,” said Brian Vesper, head of Ingram Micro‘s Cyber Security Center of Excellence in Europe. “Along with this, we have witnessed a tremendous surge in cyberattacks focusing on the vulnerabilities exposed by this transformation.”
Sign up for Channel Futures’ new EMEA newsletter, where we feature news and analysis involving companies based in Europe, the Middle East and Africa, as well as those doing business in that region. |
Ingram Micro wants to be the world’s largest cybersecurity solution provider and consultant by 2021, he said.
With AppGuard, Ingram Micro can provide a solution that prevents cyberattacks before they can compromise critical systems, he said. And there’s no impact to the performance of the endpoint.
“We believe that we can very quickly strengthen the cybersecurity posture of the MSSP community within Europe … through Ingram Micro,” said Maitland Muse, AppGuard’s executive vice president of channels and strategic alliances.