HomeNewsIndia NewsTrend Micro research finds misconfiguration as number one risk to Cloud ...

    Trend Micro research finds misconfiguration as number one risk to Cloud Environments

    Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in cloud security,  released the findings from research into cloud security, which highlights human error and complex deployments open the door to a wide range of cyber threats.

    Gartner predicts that by 2021, over 75% of midsize and large organizations will have adopted multi-cloud or hybrid IT strategy. 1 As cloud platforms become more prevalent, IT and DevOps teams face additional concerns and uncertainties related to securing their cloud instances.

    This newly released report reaffirms that misconfigurations are the primary cause of cloud security issues. In fact, Trend Micro Cloud One – Conformity identifies 230 million misconfigurations on average each day, proving this risk is prevalent and widespread.

    “Cloud-based operations have become the rule rather than the exception, and cybercriminals have adapted to capitalize on misconfigured or mismanaged cloud environments,” said Greg Young, vice president of cybersecurity for Trend Micro. “We believe migrating to the cloud can be the best way to fix security problems by redefining the corporate IT perimeter and endpoints. However, that can only happen if organizations follow the shared responsibility model for cloud security. Taking ownership of cloud data is paramount to its protection, and we’re here to help businesses succeed in that process.”

    The research found threats and security weaknesses in several key areas of cloud-based
    computing, which can put credentials and company secrets at risk. Criminals capitalizing on
    misconfigurations have targeted companies with ransomware, cryptomining, e-skimming and data exfiltration.

    Misleading online tutorials compounded the risk for some businesses leading to mismanaged cloud credentials and certificates. IT teams can take advantage of cloud native tools to help mitigate these risks, but they should not rely solely on these tools, the report concludes.

    Trend Micro recommends several best practices to help secure cloud deployments:

    • Employ least privilege controls: restricting access to only those who need it.
    • Understand the Shared Responsibility Model: Although cloud providers have built-
      in security, customers are responsible for securing their own data.
    • Monitor for misconfigured and exposed systems: Tools like Conformity can
      quickly and easily identify misconfigurations in your cloud environments.
    • Integrate security into DevOps culture: Security should be built into the DevOps process from the start.

    For more information, visit www.trendmicro.com

    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    New LX4580 – Highly Integrated 24‑Channel Mixed‑Signal IC for Aviation & Defence Actuation Systems

    Microchip Technology announces the LX4580, a 24‑channel mixed‑signal IC designed...

    TI redoubles advancement of next-gen physical AI with NVIDIA

    Texas Instruments announced accelerating the safe deployment of humanoid...

    Everspin Advances High-Reliability xSPI MRAM Portfolio With Complete Production Qualification for 64Mb MRAM

    Everspin Technologies, the world’s leading developer and manufacturer of...

    R&S acquires SRS, specialists in SDR communications solutions

    Rohde & Schwarz acquired Software Radio Systems (SRS), a...

    Differentiating Between LPDDR6, LPDDR5, and LPDDR5X

    Courtesy: Synopsys Advances in memory standards are driving faster and...

    Arrow Electronics and Infineon introduce 240W USB-C PD 3.2 reference design for battery-powered motor control applications

    Arrow Electronics and Infineon Technologies AG have announced REF_ARIF240GaN, a...

    Robotics Engineering: The Architectural Evolution Behind IT–OT Convergence

    Factories today operate as dense mechanical ecosystems, whether in...

    How AI Is Transforming Network Protocol Testing in Software-Defined Networks?

    As enterprises accelerate toward cloud-native infrastructure, edge computing, and...

    What is Fashion Tech? Providing New Product Value and Customer Experiences with Technology

    Courtesy: Murata Electronics What is fashion tech? - diverse technologies...