Intelligent CISO Issue 07 | Page 28

editor’s question DRAGAN PETKOVIC, SECURITY PRODUCT LEADER ECEMEA ORACLE O ne of the biggest complaints with cloud services is that there are perception problems of security, latency and governance. Why would I put my data on a computer that I don’t control? However, today’s borderless enterprises are increasingly turning to cloud computing in an effort to protect themselves against the rising tide of external cyberthreats. Companies respond in several ways to mitigate the threat of cyberattacks which includes hiring CEOs who come from a cybersecurity background, as they know how to manage risk and speed up migration to the cloud. By 2025, 80% of cloud operations risk will vanish entirely and a higher degree of intelligent automation will permeate the cloud platform – becoming 28 the catalyst that further accelerates enterprise cloud adoption. Machine versus machine, battling sophisticated cybercrime with autonomous cloud solutions Cybercrime is becoming increasingly sophisticated and organisations are finding it difficult to effectively detect, prevent and respond to modern cyberattacks. In March, Oracle announced its Autonomous Data Warehouse Cloud Service, a solution that protects systems from external attacks and malicious internal users by automatically applying As mobile users proliferate and the network edge moves into the cloud, your IT resources are vulnerable to new threats. security updates with no downtime while also encrypting data. Best practice to ensure security in the cloud No cloud service should be without data encryption. Encryption is one of the easiest technical controls to implement and a number of organisations opt for it as a quick win since it requires minimum human intervention. It has been used for decades and it is a big concern that some organisations are still not using it to protect their confidential data. Many enterprises are also implementing security solutions that analyse user behaviour. Rather than focusing solely on quickly identifying attack objects such as viruses, malware or beating the hackers to the punch with early discovery of vulnerabilities. Unfortunately, many IT administrators lose their security precautions with the adoption of cloud services; there is no longer any perceived network separation, physical separation or unique login procedures. Losing the controlled administrative access the IT teams are accustomed to can represent a significant void in the security posture. UBA solutions fill this void by acting as another layer of security beyond simple credentials. As mobile users proliferate and the network edge moves into the cloud, your IT resources are vulnerable to new threats. Businesses need consistent security controls that span cloud and on-premises environments. These controls must apply identity context to better predict, prevent, detect and respond to threats. Oracle’s security cloud services make these leading security technologies available everywhere to organisations large and small. Issue 07 | www.intelligentciso.com