New threats, new apps, new players – but data plays the biggest role in shaping the future.
Written by Amit Shaked, CEO, Laminar
The 2021 attack has set a new record
Looking back, 2021 was a fair share of cyber security incidents. Take, for example, the violation of the colonial pipeline, where there was a risk of shutting down the US energy supply. Bitcoin was paid a 2.3 million ransom to avoid disaster and to continue its business activities.
You can probably expect a steady increase in new methods of attacking and targeting in 2022. However, one component of the security advancement that will make a huge difference next year is data – cloud data.
According to TechjuryOn average, each person created at least 1.7 MB of data per second in 2020. Every second, Think for that. Data is an important element in every environment and your protection plan is paramount. Democratizing data means putting it in the hands of more users and data scientists who can quickly build customer value. What better place to do it than the clouds? But while developers now have the flexibility and ability to do whatever they want in the cloud, data protection teams are lagging behind.
Here are our top five cloud security forecasts for 2022, given the rise of cyber-attacks, the ubiquity of cloud computing, and increasing data production.
Top 5 Cloud Security Predictions
1- Increased investment will lead to improved cloud security
Every year we see increased investment in cloud security.
According to GartnerCloud Security is the fastest growing security segment that can grow 41.2% Between 2020 and 2021, it reached about 1 billion.
What does all this mean? Improved cloud security.
Data protection is a top priority for many organizations, especially since most data is in the cloud. Consumers and businesses expect protection, and they will weigh in with their dollars. In order to achieve a good result, it is essential for companies to continue investing in data security
2 – Cloud data protection will improve the pace of data democratization
Every company, no matter how big or small, is changing the way they operate through digital technology. Most of these changes involve processing and transferring data to the cloud and making the data accessible to everyone in the organization. This is data democratization.
2022 Cloud data protection will begin to keep pace with data democratization.
Data is the new currency. This is an important factor in making informed business decisions and providing a personalized experience that consumers not only expect but expect.
Protecting and monitoring your data is crucial to survival, but for proper defense, companies must have a baseline understanding of their data.
IT leaders need to know the answers to five important questions:
- Where is my data?
- Who has access?
- What is a security posture?
- Who owns the data?
- Where is my data going?
A sensitive breach can bring a company to its knees. So the more you invest in digital transformation, the more you need to invest in data security.
3- Cloud-native security tools will become mainstream
As more data is transferred to the cloud, more workloads, processes and solutions are being created and run locally.
Cloud-native applications are run and hosted in the cloud and are designed to capitalize on the underlying features of a cloud computing software delivery model.
In the cloud, security solutions built for the cloud are still not entirely mainstream, but they are growing much faster than their successor counterparts. In 2022, we will see that many more of them will emerge and mature.
4 – Security teams move from gatekeeper to enabler
It is the responsibility of the security team to ensure that each process follows strict security protocols, so historically, they have been seen as a barrier to progress. 2022 is about to see a change in that pattern, as security forces move from gatekeepers to competitors.
Why? Because more applications are being created in the cloud as opposed to on-premises.
Cloud application developers don’t have many restrictions, and you don’t have to wait for multiple stakeholders to get to the next level. At the same time, security teams are deploying cloud-native solutions that constantly monitor and enforce policies, enabling a “trust but verify” position. That way, developers are not deterred and security teams can move at cloud speeds.
So while still safe to continue the digital transformation, once-limited gatekeepers will harness and enable the power of cloud development.
5 – Improved tools will continue to emerge, not integration … yet
According to Cyber ​​Research Databank, there are more than 3,500 cyber security vendors in the market.
If you’re a security leader, you’ll probably be bombarded with offers for the next best solution. There may be a tool you want that works as a one-stop-shop for all the features and capabilities you need, but we’re not there yet.
Consolidation is happening, but we think vendor expansion will continue in 2022.
Why is that?
Take COVID-19 as an example. Think of the virus as a new violation. When that violation hits, people shake to build defenses to fight it. You made a vaccine and are feeling better, but then the delta variant pops up and you shake again. Hoping to subdue that variant, Omicron suddenly wakes up. It goes. How many forms will appear before we seem to have dealt with each threat? There is no way to tell, so you have to build defenses to stay safe.
The security world is the same. Every year we see new threats emerge and we build tools to deal with them. Before these violations slow down, new tools will continue to proliferate in the market.
That year data is more important
Data is actually a key element of business survival and as a result, it is the element that you need to protect the most. It’s a new business currency and something that everyone benefits from using safely.
In this cloud-first world, where digital transformation is happening fast and complexity is high, traditional methods are moving away. The ability to discover, classify, and classify all data within your universal cloud environment is a requirement for staying secure and smart.
About the author
Amit Shaked, CEO, Laminar. He is also the founder of Laminar, which started in 2020.
Notice of fair use: Under the “fair use” law, other authors may restrict the use of the original author’s work without permission. 17 In accordance with US Code § 107, certain uses of copyrighted material “for the purposes of criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship or research, are not copyright infringement.” As a matter of policy, fair use is based on the belief that parts of copyrighted material are free to be used for the purpose of public comment and criticism. The privilege of fair use is perhaps the most significant limitation of the exclusive rights of a copyright owner. Cyber ​​Defense Media Group is a news reporting company that reports cyber news, events, information and much more on our website Cyber ​​Defense Magazine at no charge. All images and reporting are done exclusively under the fair use of US copyright law.