Thales eSecurity Blog

With Great Technology Comes Great (Data) Responsibility – The Cloud, Big Data and IoT Edition of the Vormetric 2016 Data Threat Report

Tina Stewart
Tina Stewart | Marketing More About This Author >

sensitive data in the cloudAs organizations rush to promising new markets, security practices often take a back seat. But to fully reap the benefits of emerging technologies – such as cloud, big data and the Internet of Things (IoT) – organizations must focus on enterprise security requirements to ensure their most critical data is kept safe.

In today’s digital world, “cyberattack” and “data breach” have become household terms, as evidenced by President Obama’s proposed 35% budget increase for cybersecurity spending. Alongside the $19 billion ask, he also unveiled a new Cybersecurity National Action Plan (CNAP). (For a deeper dive into this announcement and what it means for federal agencies, be sure to check out my colleague, Wayne Lewandowski’s recent blog post.)

ClickToTweet: To reap the benefits of Cloud, Big Data and IoT – Protect your data @socialtis

In light of cybersecurity being brought to the forefront, security professionals are becoming increasingly concerned with protecting their organization’s sensitive data. Overwhelmingly, enterprises must contend with moving into the cloud and other outsourced service models while simultaneously combating resourceful attackers looking to compromise systems.

To gain a better understanding and ultimately combat threats, we released the cloud, big data and IoT focused edition of the 2016 Vormetric Data Threat Report today, highlighting threats in emerging cloud, big data and IoT technologies.

As information moves to the cloud or other environments, data may be under an organization’s logical control, but physically reside in infrastructures owned and managed by another entity. This shift in control is a top reason that new approaches and techniques are required to ensure organizations can maintain data security. Per our survey findings, data security concerns for emerging technologies include the following:

  • Top data security concerns for cloud
    • Security breaches/attacks at the service provider (70%)
    • Increased vulnerabilities from shared infrastructure (66%)
    • Lack of control over the location of data (66%)
  • Top data security concerns for big data
    • Security of the reports produced – as they may include sensitive data (42%)
    • Sensitive information may reside anywhere within the environment (41%)
    • Privacy violations from data originating in multiple countries (40%)
  • Top data security concerns for IoT
    • Protecting sensitive data generated by IoT (35%)
    • Privacy violations (30%)
    • Identifying which data is sensitive (29%)

Let’s hope your security sense is tingling. (This will be the last Spidey reference – scout’s honor.)

Our survey also found that the storage of critical information within cloud, big data and IoT environments continues to increase. As many as 85% of organizations expect to have sensitive data in the cloud within the next 12 months, as compared to 54% last year. Similarly, 50% of respondents plan to store sensitive data within big data environments, up from 31% previously. And though only 33% of organizations expect to have sensitive data within IoT implementations, they too have strong concerns about the safety of that information.

As cloud, big data and IoT adoption accelerates, these technologies continue to bring new sets of unique risks to organizations. Amid the flurry of recent data breaches, many organizations remain focused on traditional defenses like network and endpoint security. These defenses are clearly no longer sufficient on their own to respond to new security challenges.

With the emergence of offerings, we are gradually making the security controls that enterprises need to meet regulatory and compliance obligations as well as other data security requirements available. But there is an obvious disconnect between the old ways of approaching security and the new security approaches required by modern threats. There is still much work to be done.

Want to learn more about how Vormetric can help you protect your organization’s sensitive data – wherever it may reside? Leave a comment below, or tweet me @SocialTIS.