Intelligent CISO Issue 22 | Page 6

news Microgaming secures cloud strategy with Netskope etskope, a leader in cloud security, has announced that award-winning Isle of Man based online gaming software supplier Microgaming is using Netskope’s Security Cloud. This move is designed to support the movement of key business applications to the cloud. N The Netskope Security Cloud provides visibility and real-time data and threat protection when accessing cloud services, websites and private apps from anywhere, on any device. With the intention of migrating to the cloud with Office 365, Microgaming selected Netskope’s combined Cloud Access Security Broker (CASB) and next generation Secure Web Gateway (NG-SWG) to map every web and cloud transaction, enabling it to understand user activity across all SaaS and IaaS services and any website. Netskope also unifies Microgaming’s policy management across both cloud and web traffic from a single cloud- native platform. Microgaming’s Information Security Manager Samantha Hoffmann said: “We have been able to migrate to the cloud because our Netskope Security Cloud has given us the borderless visibility and control we need.” Netskope is providing Microgaming with real-time controls between users and the cloud, the protection of sensitive information and the ability to control shadow IT. Netskope immediately identified 700 unsanctioned cloud apps being used within Microgaming and Netskope’s Cloud Confidence Index (CCI) provides on-going assessment of the security credentials of any cloud application. 6 VENAFI REVEALS RESEARCH ON SECURITY CONTROLS FOR HUMAN AND MACHINE IDENTITIES enafi, a leading provider of machine identity protection, has announced the results of a study comparing security controls for human and machine identities. V People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services. Machines also need to authenticate themselves to each other so they can communicate securely, relying on cryptographic keys and digital certificates, which serve as machine identities. To better understand the gap between implementation of security controls for human identities and those for machine identities, Venafi sponsored a survey that evaluated similar security controls for each type of identity. For example, just half (54%) of organisations have a written policy on length and randomness for keys for machine identities, but 85% have a policy that governs password length for human identities. Additional findings from the study include: • Less than half (49%) of organisations audit the length and randomness of their keys, while 70% do so for passwords • Only 55% have a written policy stating how often certificates and private keys should be changed, while 79% have the equivalent policy for passwords • Only 42% of organisations automatically enforce the rotation of TLS certificates, compared with 79% that automatically enforce the rotation of passwords Issue 22 | www.intelligentciso.com