cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home Cloud

The beauty of the Omnipresent Cloud

Nilesh Jain VP Southeast Asia and India, Trend Micro by Nilesh Jain VP Southeast Asia and India, Trend Micro
June 30, 2020
beauty of the Omnipresent Cloud

Image: Nilesh Jain

The fog has lifted to reveal photos of cities around the world with clearer skies – an unexpected silver lining in this pandemic. The next time you look skyward, may I suggest that you take a closer look at the clouds dotting the sky too? We often miss not only the beauty of the atmosphere’s omnipresent cloud but also cloud interfaces integrated all around our homes, offices, and public spaces.

Amid the COVID-19 pandemic, many countries across the world opted to go under a ‘lockdown’ to ‘flatten the curve’ of infection. These lockdowns meant confining the citizens to their homes and shutting down businesses. While it has definitely slowed down economic activity, certain kinds of businesses have experienced tremendous growth. Take Netflix, for example. Owing to social distancing and stay-at-home orders, it is but obvious that people are keeping themselves entertained through multimedia streaming apps. For the first quarter of 2020, new Netflix subscriptions reached 15.8 million surpassing the earlier prediction of 8.8 million.

This brings us to the question of how Netflix could cope with such a massive surge in usage. The answer is the public cloud. Apart from the almost instant scalability it brings, the cloud-based business model used by companies such as Netflix allows them to not just scale when required, but also handle shifts in traffic patterns—all the while remaining reliable to their customers.

It is clear that the pandemic will accelerate cloud adoption. The opting for a cloud environment, once viewed as an option, will now witness greater urgency, due to the many benefits it brings. According to the annual State of the Cloud Survey, 30% of large enterprises expect their cloud usage to increase as a result of the present crisis significantly. Furthermore, among SMBs and enterprises, a net 47% of organizations plan for increased cloud usage because of the changes that the pandemic has brought on. However, this increasing reliance on the public cloud comes with several underlying challenges, the biggest of which is misconfigurations. 

Misconfigurations—the biggest challenge in cloud environments

It is vital to remember that moving to the cloud does not mean all risks are eliminated. While some risk factors are reduced, others are introduced. Cloud environments face security vulnerabilities on several counts, from the failure to maintain proper security hygiene to system vulnerabilities at the end-user level. In fact, according to research conducted by Crowd Research Partners, nine out of ten cybersecurity experts are highly concerned when it comes to cloud security. 

Biggest among these threats are misconfigurations, which to put it in the simplest of terms are the mistakes of the IT teams as they set up the organization’s cloud infrastructure. According to a study conducted by Trend Micro, it was found that on average 165 million misconfigurations take place on the cloud every day. The same study also pointed out that four out of ten— 40%—of cloud-related incidents can be traced back to a misconfiguration in the cloud environment. 

ADVERTISEMENT

It is necessary to understand why misconfiguration is such a big threat. Let’s take an example we are all familiar with—an iPhone. Before starting to use a new phone, the security settings on the phone needs to be configured, to be changed from the default setting. Setting up privacy measures such as passcodes, fingerprint analysis, whether one wants to upload a picture of oneself to their Apple account, etc., has to be set up. Similarly, when an organization migrates their workloads to a cloud platform, security needs to be configured. Nevertheless, inadvertent misconfigurations are common. For instance, an application team configuring a workload whose prime concern would be application connectivity may unintentionally misconfigure the connectivity, thereby overlooking network security. 

Another reason for the rise in cloud misconfigurations can be attributed to the lack of visibility and rapid public cloud adoption. Without adequate visibility, security teams are unable to secure cloud environments. Furthermore, as the percentage of adoption grows, the volume of activity proportionally increases, leading to additional misconfigurations such as a lack of awareness of cloud security and policies, the lapse in supervision, lack of or insufficient control, and negligent internal activities. Add to this the number of services being provided by public cloud providers and it is easy to understand why misconfigurations occur. AWS, for example, between the years 2007 and 2017, has added 100 services to its portfolio, which roughly works out to around 10 services each year. This number spiked in the last two years alone, with their portfolio of services adding over 75 offerings.

On top of configuration visibility issues, container which has emerged as a solution for complicated micro service based cloud native applications (through the flexibility it provides) causes security teams to have very less visibility. This can be primarily attributed to the shared responsibility shift in DevOps, which then results in forgotten systems and undeleted logs which can turn out to be a hidden vulnerability. 

Underlying all these challenges is the fact that the pace of technology adoption is much faster than the adoption of security technology. For instance, by the time an enterprise adopts the use of containers, serverless technology emerges as another level of abstraction on top of containers—making it all the more difficult for security teams to keep up.

Beauty of the Omnipresent Cloud

Steps to avoid misconfiguration

The number of security breaches steadily increasing due to misconfiguration makes it all the more important for enterprises to take the right steps to prevent these. The need of the hour is for security teams to deploy a single security tool that offers the equal amount of visibility and security for both on-premise applications and new generation container and serverless based micro services applications. The next best practice would be for organizations to deploy custom design tools which can perform an auto-audit of any misconfiguration, thereby matching the best practices guidelines offered by vendors and provide solutions on the go. Finally, it’s always best to partner with professional security consultants, who can help design security cloud architectures that will match future needs. Additionally, simple measures such as integrating security in DevOps from the very beginning and employing least privilege controls which restricts access to only those who need it will also go a long way in protecting cloud infrastructures. 

Beauty of the Omnipresent Cloud

Enterprises are equally responsible for their assets on the cloud

Most public cloud providers operate with a shared responsibility model. While the onus is on them to protect the infrastructure, it is up to enterprises to be responsible for securing their applications, data, operating systems, access management, and firewalls. Preventing misconfigurations then becomes the vital first step in ensuring security for assets on the cloud.

Disclaimer: The author of this article is Nilesh Jain, Vice President, Southeast Asia, and India at Trend Micro. All views expressed in the post are the author’s and the publication does not claim rights to it


  • Top 10 Data and Analytics Technology Trends for 2020
  • Five Benefits of Deploying Cloud in Banking
  • How Enterprise Networks can Address the Growing Issues of Internet Traffic

Nilesh Jain VP Southeast Asia and India, Trend Micro

Nilesh Jain VP Southeast Asia and India, Trend Micro

Nilesh Jain, Vice President, Southeast Asia and India at Trend Micro

Related Posts

AMD Sanmina
Business

AMD to Sell ZT Systems’ Manufacturing Business to Sanmina for $3 Billion

May 20, 2025
Red Hat AI NVIDIA
AI

Red Hat Empowers Agentic AI with Support for NVIDIA Enterprise AI Factory

May 20, 2025
Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Qualcomm Advantech
Business

Qualcomm and Advantech Join Forces to Accelerate AI for IoT Applications at COMPUTEX 2025

May 20, 2025
Tech Mahindra
Press Release

Tech Mahindra Achieves Red Hat Premier Partner Status Globally

May 20, 2025
Kiran Cherukuri
People

HCLTech Appoints Kiran Cherukuri as New Global GCC Practice Leader to Drive Innovation and Growth

May 20, 2025
NetApp NVIDIA
Business

NetApp and NVIDIA Partner to Enhance AI Adoption with the AIPod Solution for Streamlined Data Management

May 19, 2025
GIGABYTE at COMPUTEX 2025
Press Release

GIGABYTE at COMPUTEX 2025: Accelerating the AI Future With Total Infrastructure and Computing Solutions

May 19, 2025
Load More
Please login to join discussion
ADVERTISEMENT

Latest Updates

AMD Sanmina

AMD to Sell ZT Systems’ Manufacturing Business to Sanmina for $3 Billion

by Deepa Sharma
1 hour ago

Red Hat AI NVIDIA

Red Hat Empowers Agentic AI with Support for NVIDIA Enterprise AI Factory

by Deepa Sharma
2 hours ago

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

by Sundar Balasubramanian
2 hours ago

Qualcomm Advantech

Qualcomm and Advantech Join Forces to Accelerate AI for IoT Applications at COMPUTEX 2025

by Deepa Sharma
3 hours ago

Tech Mahindra

Tech Mahindra Achieves Red Hat Premier Partner Status Globally

by News Desk
4 hours ago

Kiran Cherukuri

HCLTech Appoints Kiran Cherukuri as New Global GCC Practice Leader to Drive Innovation and Growth

by Deepa Sharma
6 hours ago

Expert Views

Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved