Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3403,"date":"2024-06-18T18:56:05","date_gmt":"2024-06-18T18:56:05","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/"},"modified":"2024-06-18T18:56:05","modified_gmt":"2024-06-18T18:56:05","slug":"the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/","title":{"rendered":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm"},"content":{"rendered":"

A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/p>\n

\u200b[[{“value”:”<\/p>\n

A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/em><\/p>\n

The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge.<\/p>\n

Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps<\/em> (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications.<\/p>\n

Let\u2019s dig into the results.<\/p>\n

Key Findings<\/strong><\/h2>\n

Multicloud is the new norm, not the exception
\nMisconfigurations remain a monster problem that needs attention
\nSecurity needs to scale to support both cloud native application development and runtime protection<\/p>\n

Multicloud \u2013 the new normal <\/strong><\/h2>\n

One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs.<\/p>\n

Top issues with cloud applications<\/strong><\/h2>\n

Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections.<\/p>\n

Secure from the start<\/strong><\/h2>\n

Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss.<\/p>\n

DevSecOps to the rescue<\/strong><\/h2>\n

The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production.<\/p>\n

Better tools for faster remediation<\/strong><\/h2>\n

Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this.<\/p>\n

Security efficiency supports scale<\/strong><\/h2>\n

To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture.<\/p>\n

Investing in the future<\/strong><\/h2>\n

Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks.<\/p>\n

Taking the next step<\/strong><\/h2>\n

The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/p>\n

\u200b[[{“value”:”<\/p>\n

A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/em><\/p>\n

The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge.<\/p>\n

Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps<\/em> (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications.<\/p>\n

Let\u2019s dig into the results.<\/p>\n

Key Findings<\/strong><\/h2>\n

Multicloud is the new norm, not the exception
\nMisconfigurations remain a monster problem that needs attention
\nSecurity needs to scale to support both cloud native application development and runtime protection<\/p>\n

Multicloud \u2013 the new normal <\/strong><\/h2>\n

One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs.<\/p>\n

Top issues with cloud applications<\/strong><\/h2>\n

Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections.<\/p>\n

Secure from the start<\/strong><\/h2>\n

Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss.<\/p>\n

DevSecOps to the rescue<\/strong><\/h2>\n

The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production.<\/p>\n

Better tools for faster remediation<\/strong><\/h2>\n

Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this.<\/p>\n

Security efficiency supports scale<\/strong><\/h2>\n

To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture.<\/p>\n

Investing in the future<\/strong><\/h2>\n

Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks.<\/p>\n

Taking the next step<\/strong><\/h2>\n

The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":3404,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nThe State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security \u200b[[{"value":" A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge. Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications. Let\u2019s dig into the results. Key Findings Multicloud is the new norm, not the exception Misconfigurations remain a monster problem that needs attention Security needs to scale to support both cloud native application development and runtime protection Multicloud \u2013 the new normal One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs. Top issues with cloud applications Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections. Secure from the start Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss. DevSecOps to the rescue The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production. Better tools for faster remediation Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this. Security efficiency supports scale To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture. Investing in the future Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks. Taking the next step The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: "}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-18T18:56:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm\",\"datePublished\":\"2024-06-18T18:56:05+00:00\",\"dateModified\":\"2024-06-18T18:56:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\"},\"wordCount\":889,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\",\"name\":\"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif\",\"datePublished\":\"2024-06-18T18:56:05+00:00\",\"dateModified\":\"2024-06-18T18:56:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm","og_description":"A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security \u200b[[{\"value\":\" A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge. Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications. Let\u2019s dig into the results. Key Findings Multicloud is the new norm, not the exception Misconfigurations remain a monster problem that needs attention Security needs to scale to support both cloud native application development and runtime protection Multicloud \u2013 the new normal One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs. Top issues with cloud applications Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections. Secure from the start Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss. DevSecOps to the rescue The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production. Better tools for faster remediation Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this. Security efficiency supports scale To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture. Investing in the future Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks. Taking the next step The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \"}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2024-06-18T18:56:05+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm","datePublished":"2024-06-18T18:56:05+00:00","dateModified":"2024-06-18T18:56:05+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/"},"wordCount":889,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/","name":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif","datePublished":"2024-06-18T18:56:05+00:00","dateModified":"2024-06-18T18:56:05+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16718386-JDE6GJ.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/the-state-of-cloud-security-platforms-and-devsecops-on-june-18-2024-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"The State of Cloud Security Platforms and DevSecOps on June 18, 2024 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=3403"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3404"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=3403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=3403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=3403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}