One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2673811
Date de publication 2021-04-21 10:00:00 (vue: 2021-04-21 10:05:42)
Titre Bridging the Cybersecurity frontier: SaaS
Texte This blog was written by an independent guest blogger. Software as a service (SaaS) is one of the most important parts of the modern digital business. Unfortunately, when it comes to cybercrime, it can also be one of the weakest. The Cybersecurity newsletter, The Hacker News, have highlighted this in detail, noting interest from across the digital industry in addressing the holes created by misconfigured SaaS setups. The use of unsanctioned business software, and the lack of controls and best practices to help assist companies with assurance can create a bad concoction. Addressing this requires a complete overhaul of business processes, starting with addressing the very nature of SaaS usage by the company. Looking at core philosophy SaaS is, according to Forbes, a key disruptor in many global markets. Utilized not just by digitally-focused businesses, this has unfortunately meant that many businesses are keen to get on the bandwagon long before they are prepared. This lack of preparation for the use of SaaS is what creates issues with security in the long run. How can businesses meet this risk and mitigate it? A key part of achieving this is through controlling growth. There is a compelling argument to be made that unbridled growth has caused many of the issues that digital businesses, not just SaaS-focused ones, have. Whether that’s through DDoS attacks, insufficient manpower to staff operations or other situations, demand can exceed capacity. That includes security systems. When considering the advantages of the model, businesses moving into SaaS should therefore also ensure that they have proper capacity to meet the customer demand and ensure a high level of cybersecurity assurance. Building from the base Having a measured growth strategy that is inclusive of the potential demands of the business is a first step that allows a cybersecurity response to be built accordingly. The challenge SaaS poses is in a lack of assurance that users are following cyber protocols. The corridor between business and customer can let in malicious users and malware at any stage of a transaction – leading to a loss of data, revenue, reputational damage, or all three. Defining the risk and managing it is a case of forming ‘quarantine’ points, where businesses and their customers are able to securely store their data without risking it being accessed inappropriately by others. SASE systems Increasingly, businesses are meeting this demand using secure access service edge (SASE) systems, according to the UK's Computer Weekly. Research by Gartner expects 40% of businesses will be using SASE by 2024, and for good reason – it provides a secure environment through which to run SaaS, and all the risks it entails, without creating downtime for customers that could lead to lost revenues. Having this secure corridor also allows for other important business security measures, like data protection and security, to be carried out with a high level of assurance. SASE is not the only protocol to follow, and many businesses are constructing their own proprietary system security for their SaaS plat
Envoyé Oui
Condensat  businesses 2021 2024 a key able access accessed according accordingly achieving across addressing advantages age all allows also any are area argument assist assurance assurance can attacks bad bandwagon base before being best between blog blogger bridging building built business businesses can capacity carried case caused center challenge clear comes companies company compelling complete computer concoction considering constructing controlling controls core corridor could create creates creating crucial customer customers cyber cybercrime cybersecurity damage data ddos defining demand demand using demands detail develop digital digitally disruptor does downtime early economy edge  ensure entails environment especially exceed expect expects experience extensive first focused follow following forbes forming from front frontier: further future gartner get global good growth guest hacker has have having help high highlighted holes created how however important inappropriately incentive includes inclusive increasingly independent industry insufficient interest issues just keen key lack lead leading let level like long looking loss lost made malicious malware managing manpower many markets meant measured measures meet meeting misconfigured mitigate model modern most important move moving must nature news newsletter not noting offer one ones only operations other others out overhaul own part parts philosophy place platform platforms points policy poses potential practices preparation prepared processes proliferate proper proprietary system security protection protocol protocols provides reason remote reputational requires research response revenue revenues risk risking risks run saas saas should sase secure securely security see service setups similar situations software staff stage start starting step store strategy such systems technical that’s them then therefore those three through transaction uk's unbridled unfortunately unsanctioned usage use users using utilized very weakest weekly what when where whether which will without working written
Tags Malware Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: