Cloud

1/26/2018
11:28 AM
50%
50%

Endpoint and Mobile Top Security Spending at 57% of Businesses

Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.

There is a disconnect between businesses' ideal security practices and their actual strategies. Some 77% of companies cite data-at-rest security tools as the most effective for preventing breaches but fall toward the bottom (40%) of security spending priorities, new data shows.

In its 2018 Data Threat Report, Thales teamed up with 451 Research to poll 1,200 senior security execs around the world. They discovered 94% of respondents use sensitive data in the cloud, big data, IoT, container, blockchain, and/or mobile environments. Forty-four percent say they feel "very" or "extremely" vulnerable to data security threats.

For 57% of businesses, the bulk of security budgets goes toward endpoint and mobile security technologies, followed by analysis and correlation tools (50%). The disconnect extends to encryption, which many cite as important but don't allocate spending toward encryption tech.

Forty-two percent of respondents use more than 50 SaaS applications, 57% use three or more IaaS vendors, and 53% use three or more PaaS environments. Nearly half (44%) cite encryption as the top tool for increased cloud usage; 35% say it's a necessary part of big data adoption. Encryption is also cited as the top tool for securing IoT (48%) and container (41%) deployments.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/28/2018 | 7:48:35 PM
Data at rest encryption
> "Some 77% of companies cite data-at-rest security tools as the most effective for preventing breaches but fall toward the bottom (40%) of security spending priorities, new data shows."

Makes sense to the extent that we know that eating a lot of vegetables and as little sugar as possible is good for us, but that that "knowledge" is not reflected in our grocery shopping.

Data-at-rest encryption, at the same time, is a bit controversial because fundamentally, arguably, credentials/authorization matter much more -- not to mention that encryption has been argued to potentially hinder accessibility to the point of potential compliance issues ( as I've observed here: securitynow.com/author.asp?section_id=613&doc_id=739452 ).
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3965
PUBLISHED: 2019-03-23
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.
CVE-2016-10743
PUBLISHED: 2019-03-23
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2019-9947
PUBLISHED: 2019-03-23
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) follo...
CVE-2019-9948
PUBLISHED: 2019-03-23
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...