IT security pros have it rough: The pace of modern workflows has turned perimeter security solutions into sieves. As those security pros try to keep up with new threats, they might be better off taking the opposite approach and slowing down. Over the coming years, the largest cyber threats won’t be new; instead, they will come from well-known vulnerabilities. To address these vulnerabilities, businesses don’t even need to look beyond their own network.
The private sector is often ahead of the government when it comes to best practices, but not always. Gartner predicts that half of all enterprises with more than 1,000 users will use a cloud security solution by 2018. The pace of adoption in the enterprise is swift, but even the Federal Government built a large scale program, known as FedRAMP, that streamlines the cloud vetting process for government agencies.
We all know the many benefits of using SaaS apps and cloud services: boost productivity, cut costs, collaborate better, work from anywhere, yadda-yadda-yadda. If you read our post last week you also know that not all cloud vendors are created equal. So exactly whose job is it to weigh up vendor security and risk?