• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Wireless Bluetooth 5.0 Earbuds, Sport Headphones Matte Design Earbuds with Battery Charging Case for $18

    Wireless Bluetooth 5.0 Earbuds, Sport Headphones Matte Design Earbuds with Battery Charging Case for $18
  • Altec Lansing HydraShock Everything Proof Wireless Bluetooth Speaker, IP67, IMW1500-SJR, Red (Certified Refurbished) for $119

    Altec Lansing HydraShock Everything Proof Wireless Bluetooth Speaker, IP67, IMW1500-SJR, Red (Certified Refurbished) for $119
  • The Essential 2023 Learn Graphic Design Bundle for $39

    The Essential 2023 Learn Graphic Design Bundle for $39
  • SalesKingPin Copywriting Tool: Lifetime License for $39

    SalesKingPin Copywriting Tool: Lifetime License  for $39
  • Abelssoft CryptBox: 3-PC Lifetime License for $19

    Abelssoft CryptBox: 3-PC Lifetime License for $19
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Top Three Cloud Data Security Predictions for 2023 

Jan 6, 2023 by iHash Leave a Comment

According to a recent analysis from IBM and the Ponemon institute, the average cost of a data breach has risen to a record high of $4.35 million in 2022. This year has certainly had its fair share of data breaches, and not one industry was safe. Government agencies, school systems, healthcare organizations, and even tech giants such as Microsoft all experienced a breach,  proving that there is still a lot of work to be done in the fight against attackers. 

There appears there will be no slowing down for cybercrime in 2023, but it’s not all doom and gloom for data security teams. Despite the odds seemingly stacked against the “good guys,” the future shows promise. 2022 was like any other year in the past 5 years when it came to cybersecurity. The cycle of business and innovation agility led to data proliferation and unintentional consequences of lost and stolen sensitive data. However, 2023 can be a year that data security professionals break that cycle.

Here’s a look at what the data security landscape will look like in 2023. 

Data security professionals will be viewed as business accelerators rather than inhibitors.

Data security has traditionally been seen as a roadblock for other areas of the organization such as IT and operations. Unfortunately, it’s the nature of the job. Data security involves having to make sure every digital asset is kept out of the hands of adversaries and is adhering to policy. With the increase in data proliferation, that has become increasingly more difficult to do. 

However, it is critical for data to be available in order for businesses to conduct day-to-day operations. Data security is a key component in making that happen and, when done correctly, is not a hindrance. 

Luckily, in 2022, more organizations began to understand the significance of data visibility and security, particularly in public cloud environments. As a result, they began to rely more and more on data security professionals and looked at them as business accelerators. I expect this sentiment to continue in 2023 as cloud data security technologies evolve to help make data security professionals’ lives easier and advance the business.  

The increase in unknown or “shadow” data will lead to more data leaks, risks for organizations. However, it will ultimately serve as a wake up call for CISOs to prioritize investments in data visibility and protection solutions.  

There is a dark side to digital transformation fueled by the public cloud. Every day developers and data scientists create, move, modify and delete data in service of positive business outcomes. And they leave a trail of unintentional risk in their wake. 

The activities that create the biggest advantages for cloud-based businesses are the same activities that introduce the most risk. As sensitive data propagates across the public cloud, risk grows.

This is the Innovation Attack Surface – a new kind of threat that most organizations unconsciously accept as the cost of doing business. Massive, decentralized, accidental risk creation by the smartest people in your business.

This unknown or “shadow” data has become a problem for 82% of security practitioners. Examples of it include database copies in test environments, analytics pipelines, unlisted embedded databases, unmanaged backups, and more. Because of its unknown content, it is at extra risk for exposure. 

Security teams can expect to see more instances of shadow data breaches in 2023. However, even though breaches caused by shadow data are set to increase, security teams are becoming more and more aware of the situation and committing to solving the problem. The emerging public cloud data security market proves that this is slowly becoming a problem at the forefront of CISOs minds, and knowing you have a problem is the first step to solving it. In 2023, CISOs will prioritize finding agile solutions that provide both visibility and protection into all of their cloud data to discover and remediate data exposure risk. 

A new data security center of excellence will report to the CISO

All security must protect data, however not all security is focused on data. With data increasingly growing more important as a currency between businesses, as well as as a means of innovation, organizations are storing and sharing more of it than ever (and increasingly, in the cloud). The skills gap created by this will begin to be addressed in 2023 with the rise of a new data security center of excellence, reporting to the CISO. 

This center of excellence will bridge the gap between the CISO and the Chief Data Officer (CDO) to ensure an entity’s valuable data is secure. The data security center of excellence will have responsibility for the following four areas: 

  1. Constantly maintaining visibility of all sensitive data
  2. Continuously protecting sensitive data
  3. Controlling who has access to sensitive data 
  4. Ensuring that sensitive data adheres to the enterprise data security policy

This center of excellence, along with more data-centric, defense-in-depth security strategies will augment the important data governance and data privacy work that the Chief Data Officer typically oversees.

Data becomes more valuable every year, which makes it more important for organizations to take the proper steps to safeguard it. Traditional approaches are vanishing in this cloud-first era, where digital change is occurring quickly and complexity is high. In 2023, to stay secure and agile, organizations must be able to locate, identify, and organize every piece of data in the public cloud environment. Doing so will enable security teams to defeat shadow data, and stay ahead of adversaries for good.

About the Author

Amit Shaked is the CEO and co-founder of public cloud data protection startup Laminar. Prior to joining Laminar, Shaked served in Unit 8200, an Israeli Intelligence Corps unit of the Israel Defense Forces, focused on collecting signal intelligence and code decryption. While in the military, Shaked earned a master’s degree in AI and deep leading. Following Unit 8200, Shaked went to late-stage startup Magic Leap before going on to co-found Laminar. 

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: https://twitter.com/InsideBigData1

Join us on LinkedIn: https://www.linkedin.com/company/insidebigdata/

Join us on Facebook: https://www.facebook.com/insideBIGDATANOW

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • Wireless Bluetooth 5.0 Earbuds, Sport Headphones Matte Design Earbuds with Battery Charging Case for $18

    Wireless Bluetooth 5.0 Earbuds, Sport Headphones Matte Design Earbuds with Battery Charging Case for $18
  • Altec Lansing HydraShock Everything Proof Wireless Bluetooth Speaker, IP67, IMW1500-SJR, Red (Certified Refurbished) for $119

    Altec Lansing HydraShock Everything Proof Wireless Bluetooth Speaker, IP67, IMW1500-SJR, Red (Certified Refurbished) for $119
  • The Essential 2023 Learn Graphic Design Bundle for $39

    The Essential 2023 Learn Graphic Design Bundle for $39
  • SalesKingPin Copywriting Tool: Lifetime License for $39

    SalesKingPin Copywriting Tool: Lifetime License  for $39
  • Abelssoft CryptBox: 3-PC Lifetime License for $19

    Abelssoft CryptBox: 3-PC Lifetime License for $19

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Altec Lansing HydraShock Everything Proof Wireless Bluetooth Speaker, IP67, IMW1500-SJR, Red (Certified Refurbished) for $119

Feb 3, 2023 By iHash

Introducing approximate nearest neighbor search in Elasticsearch 8.0

Elastic Stack 7.17.9 released | Elastic Blog

Feb 3, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Wireless Bluetooth 5.0 Earbuds, Sport Headphones Matte Design Earbuds with Battery Charging Case for $18

Expires January 27, 2123 20:49 PST Buy now and get 78% off PRODUCT SPECS Reduce Unwanted Noise While Enjoying 5 Hours of Wireless Music & Calls in Every Charge Using advanced noise-reduction technology, Earphones have been designed to reduce unwanted noise during exercise. With an onboard 2,000mAh polymer lithium battery that offers 5 hours of […]

Apple reports first quarter results

Apple periodically provides information for investors on its corporate website, apple.com, and its investor relations website, investor.apple.com. This includes press releases and other information about financial performance, reports filed or furnished with the SEC, information on corporate governance, and details related to its annual meeting of shareholders. This press release contains forward-looking statements, within the meaning of […]

The Essential 2023 Learn Graphic Design Bundle for $39

Expires February 03, 2024 23:59 PST Buy now and get 98% off Logo Animation Ideas for Minimalist Logos KEY FEATURES This course is designed to help you learn the basics of Adobe Illustrator, After Effects, and Adobe Flash. You’ll start by making a minimalist logo using only simple shapes, then we’ll add transitions with some […]

Clarity and Transparency: How to Build Trust for Zero Trust

Clarity and Transparency: How to Build Trust for Zero Trust

Be impeccable with your words. It’s the first of the Four Agreements – a set of universal life principles outlined in the bestselling book by Don Miguel Ruiz. ‘Being impeccable with your words’ is my favorite, and it’s no surprise. As a product marketer, I spend most of my daily existence casting about for the […]

Abelssoft CryptBox: 3-PC Lifetime License for $19

Expires May 03, 2023 23:59 PST Buy now and get 61% off KEY FEATURES Your own files are not safe on your personal computer. It is much too easy to get access to the computer from the outside. The easiest and most secure way to protect your data is CryptBox. CryptBox is an encryption software […]

Building a secure and scalable multi-cloud environment with Cisco Secure Firewall Threat Defense on Alkira Cloud

Building a secure and scalable multi-cloud environment with Cisco Secure Firewall Threat Defense on Alkira Cloud

In today’s security climate, NetOps and SecOps teams are witnessing increased attack surface area as applications and workloads move far beyond the boundaries of their data center. These applications/workloads move to, and reside in multi-cloud architecture, adding complexity to connectivity, visibility, and control. In the multi-cloud world, the SecOps teams use a distributed security model […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT