Skip to main content

How cloud technologies drive innovation and digital transformation

 At the industry-leading global cyber event, CPX 360 2021, thousands of guests watched the presentations delivered by some of the best cloud security experts of our era. Understanding cloud complexity and design is key in leading a successful 21st century enterprise.

Cloud security expert and Check Point Technical Marketing Engineer Maya Levine offered insights into how cloud technologies drive innovation and transformation. Maya Levine is a regular speaker at technology conferences and conducts media interviews with news channels. Her must-have insights can also be found here.

As Levine describes it, attackers are taking advantage of the changes cloud environments have prompted. They’re eager to exploit security gaps. Nonetheless, it is possible to mitigate cloud-based risks.

So, what is it about cloud applications that is different from on-premise?

  • You’re only paying for what you’re using. This is a big draw from a user or operations perspective. You don’t have to pay for the peak times year-round, you can just pay for what you use, as you use it. This model is especially applicable to serverless functions, containers and infrastructure as a service offerings.
  • You have procurement in seconds. Our ability to procure and create infrastructure used to take a long time. Now it can happen very quickly. This is probably the greatest gift for everybody except the security teams, who consequently lack the time to ensure that everything is configured correctly.
  • These applications are built with small pieces of code. You’re looking at a much more complex architectural diagram than previously. The pieces are unique, so it’s easier to understand their specific roles. However, there is a larger number of them and they’re interacting with a lot more resources, so you end up with a much more complex architecture.
  • You’re a click away from production. Developers are literally rolling out to production in a matter of hours. This is really scary to security teams because a commit to GitHub can automatically go through testing, staging, and production with no human involvement whatsoever.

So what we’re seeing, as we move towards more cloud-native tools and cloud-native approaches, is that the journey for the security teams is the opposite of everybody else’s. The more cloud native tools are embraced, the less control security teams have and the more power developers have.

Comments

Popular posts from this blog

Applications and Threats Content Release Notes

  Threat Intelligence Report Top Attacks and Breaches The biochemical systems at an Oxford university research lab currently studying the Covid-19 pandemic has been  breached . Clinical research was not affected by the incident. Breached systems include machines used to prepare biochemical samples, and hackers are currently attempting to  sell  their access to those machines. Twitter has permanently  suspended  multiple accounts found to be part of four disinformation campaign networks, most likely operated by state-sponsored actors associated with Iran, Russia and Armenia. The Iranian infrastructure was previously used to disrupt the 2020 US presidential campaign discourse. Gmail accounts of global pro-Tibet organizations have been  targeted  by the Chinese APT TA413, an espionage group known for its operations against civil dissidents. The campaign leverages a customized malicious Mozilla Firefox browser extension to gain control over the victims’ Gmail accounts. Npower, a British ga

Cisco Releases Security Updates for Cisco ASA 5506-X, 5508-X, 5516-X and Firepower// Cisco Bug IDs: CSCvp36425

A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly. The vulnerability is due to incomplete input validation of a Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ingress packet header. An attacker could exploit this vulnerability by sending a crafted TLS/SSL packet to an interface on the targeted device. An exploit could allow the attacker to cause the device to reload, which will result in a denial of service (DoS) condition. Note:  Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic. A valid SSL or TLS session is required to exploit this vulnerability. Cisco has rel

Site-to-site IPsec VPN with two FortiGates

In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard's   Site to Site - FortiGate   template. In this example, one office will be referred to as HQ and the other will be referred to as Branch. 1. Configuring the HQ IPsec VPN On the HQ FortiGate, go to  VPN > IPsec Wizard . Select the  Site to Site  template, and select  FortiGate . In the  Authentication  step, set  IP Address  to the IP of the Branch FortiGate (in the example,  172.20.120.135 ). After you enter the gateway, an available interface will be assigned as the  Outgoing Interface . If you wish to use a different interface, select it from the drop-down menu. Set a secure  Pre-shared Key . In the  Policy & Routing  step, set the  Local Interface . The  Local Subnets  will be added automatically. Set  Remote