- Home >
- Services >
- Access to Knowledge >
- Trend Monitor >
- Type of Threat or Opportunity >
- Trend snippet: The increasing importance of cloud security for enterprises
Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
The increasing importance of cloud security for enterprises
The business of the 2020s will, no doubt, live and breathe in the cloud. As newer digital technologies like AI, automation, 5G, and IoT permeate the digital ecosystem in which today’s business thrives, securing the unifying fabric of these technologies- that is, the cloud- has become synonymous with building value that lasts. Cloud security has become a question of business value, as much as that of justifying the costs associated with achieving it.
The risk and security landscape has been evolving at an exponentially rapid rate as businesses accelerate their cloud adoption strategies and mature digitally, in these five ways:
- As enterprises wade into hybrid multi-cloud environments, mapping the risk exposure of enterprise data at rest and in transit is becoming a high-complexity problem.
- As data-intensive technologies and high-speed networking technologies such as WiF-6 and 5G become a value proposition that drives competitive advantage, the velocity, variability and volume of data that drives solutions powered by AI and ML technologies are becoming subject to a variety of privacy and ethical concerns.
- The regulatory paradigm is catching up to the speed at which the technology landscape is evolving. Legislations in the EU and the Americas have enforced increasingly stringent environments such as the GDPR and the CCPA.
- The senior management remains at odds in organizations that struggle with adequate cloud security assurance.
- Lastly, security is often conceived from outdated business and technology approaches that seldom work in today’s digital business.
Businesses that want to forge a cloud security strategy for the next decade must abstract and address five key themes: the current technology ecosystem view, risks posed by the adoption of disruptive technologies (by adopters and attackers alike), the regulatory worldview of digital business, synergizing the senior management’s expectations from the cloud security spend and adoption of novel approaches that justify the business value of the security spend.
As business and digital gain synonymity, cloud security for the coming decade must be envisioned along the following lines; watertight operations through complete visibility; build operational security through the right measures; integrate security into development and deployment; adopt an extended enterprise worldview.
These goals can be achieved by bringing cloud security issues to the highest level (the boardroom), investing in business problems, budgeting with a tiered approach and monetizing, and combatting with intelligence at scale.
In the coming years, businesses will need to integrate their cloud security strategy into the larger business strategy, since the digital footprint of the digital business is bound to expand and diversify further. Therefore, optimizing and demonstrating the business value of the spend
on cloud security will become critical in maintaining the cost-competitiveness, flexibility, and scalability that cloud brings to enterprises today. It is time for senior leaders to spark the conversation and ease the discussion into the overarching business strategy to truly enmesh
the security, systems, and business view and build a responsible roadmap to end-user centricity.