2018 led us to conclude that corporate security has to pace up, as cyber attacks around the world are becoming bolder and more sophisticated. While attacks on critical infrastructures security are rising, 2019 has to bring solutions for prevention of attacks such as the attack on Marriott Starwood and Under Armor. Seems like these attacks caught their security and IT operation teams by surprise and compromised millions of users' information.

Preparing to 2019, A Ponemon reseach was made by approaching to 2,410 IT and IT security decision-makers from six different countries. The experts were asked to identify their top cybersecurity and governance priorities in preparation for the New Year.

Here are two major conclusions they had, regarding infrastructure security,  ranked Top 5 in terms of their importance:

Cybersecurity priorities for 2019:

60% of respondents see the IT infrastructure complexity as a challenge for achieving security, therefor they are looking for ways to simplify it.

Governance priorities for 2019:

47% of respondents prioritized allocating more resources to find tools that can help dealing with vulnerability management.

According to the research,  infrastructure complexity is ranked high among 2019 cybersecurity priorities. A complex infrastructure is hard to manage and maintain secured. Furthermore, real time changes are exposing the enterprise’s infrastructure to cyber attacks, and IT operation teams often struggle to keep track on new vulnerabilities. Thereby, allocating resources for vulnerability management is also top prioritized.

Security policies evolving manual handled tasks leave breaches in the infrastructure security.  Thereby, it is obvious that automating those processes will significantly reduce the infrastructure vulnerability.

One of The main issues in infrastructure vulnerability management raises is server’s configuration. Incorrect configuration  management eases attacker’s mission to hack into the system.

CalCom’s hardening automation platform, will learn your infrastructure complex structure, and manage servers configuration automatically without risking servers production. Hence, it will simplify the current state of the infrastructure for the IT operation teams, helping them keep track on real time changes and making decisions regarding security policies.

Reference:

http://static.tenable.com/marketing/research-reports/Research-Report-Ponemon-Institute-Measuring_and_Managing_the_Cyber_Risks_to_Business_Operations.pdf

https://blog.barkly.com/biggest-data-breaches-2018-so-far

https://www.insurancejournal.com/news/national/2018/11/30/510662.htm

https://fortune.com/2018/03/29/myfitnesspal-password-under-armour-data-breach

You might be interested