For decades, encryption key management provided by hardware security modules (HSM) has been the foundation for data security, but as companies move to the cloud they often find the HSM on-premises data encryption model does not efficiently serve the needs of protecting encryption keys in cloud environments. As enterprises contend with security threats CISOs are looking for simpler, standardized methods of securing data.
When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.
Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.
In September, a series of attacks included an assault on the French web hosting company OVH that reached a once inconceivable 1.1 terabits per second. And the very next month, an attack on the web infrastructure provider Dyn topped that, reportedly hitting 1.2 terabits per second.
The best way to deal with morphing attack surfaces is to implement what the military calls “defense-in-depth,” where multiple security layers protect digital assets.