easy-accordion-free
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114zoho-flow
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114wordpress-seo
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/p>\n
\u200b[[{“value”:”<\/p>\n
A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/em><\/p>\n The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge.<\/p>\n Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps<\/em> (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications.<\/p>\n Let\u2019s dig into the results.<\/p>\n Multicloud is the new norm, not the exception One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs.<\/p>\n Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections.<\/p>\n Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss.<\/p>\n The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production.<\/p>\n Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this.<\/p>\n To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture.<\/p>\n Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks.<\/p>\n The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group.<\/p>\n We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n Cisco Security Social Channels<\/strong><\/p>\n Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n “}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":" <\/p>\n A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/p>\n \u200b[[{“value”:”<\/p>\n A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security<\/em><\/p>\n The pressure to drive revenue, increase growth, and boost productivity is pushing organizations to embrace cloud native applications. In many organizations, security is an afterthought in the development process, which can lead to vulnerabilities and increased risk. This is especially true with the rapid adoption of cloud technologies, which can introduce new types of threats and obstacles. It\u2019s a complex issue that often requires a cultural shift and the adoption of new tools and practices, which can be a challenge.<\/p>\n Cisco recently partnered with TechTarget\u2019s Enterprise Strategy Group (ESG) on a survey of IT, cybersecurity, and application development professionals, The State of Cloud Security Platforms and DevSecOps<\/em> (April 2024), to better understand the scope of cloud native application development environments and how organizations are protecting cloud infrastructure and applications.<\/p>\n Let\u2019s dig into the results.<\/p>\n Multicloud is the new norm, not the exception One cloud. Two clouds. Three clouds, more! Organizations are increasingly moving their production applications and workloads to public clouds to leverage state-of-the-art cloud infrastructure. In fact, according to ESG, most organizations utilize more than three cloud service providers (CSPs). This trend is likely to continue as more organizations look to public, private, and hybrid clouds to meet their unique application requirements, support business preferences, or meet industry-specific needs.<\/p>\n Misconfiguration is not a four-letter word. Yet, the top issues plaguing cloud applications or services in the last year stem from misconfigurations. From misconfigured security groups, to lack of multifactor authentication (MFA) for access to cloud management consoles, default, or no-password access to consoles, and externally facing sever workloads, misconfigurations are a menace for organizations. The failure to detect these mistakes results in exposures that could lead to unauthorized access, lost data, and malware infections.<\/p>\n Organizations late to embrace DevSecOps, the process of incorporating security into the software development lifecycle, are paying the price. A whopping majority (79%) are employing DevOps practices, but the inclusion of critical security lags. ESG says only 26% of surveyed organizations secure more than half of their cloud native applications. This lack of security at the start has led to an uptick in security incidents, application downtime, unauthorized access to applications, and \u2013 not shockingly \u2013 data loss.<\/p>\n The good news is that organizations are planning to increase the adoption of DevSecOps over the next 24 months. Close to half of all organizations plan to deploy DevSecOps to mitigate security issues and runtime misconfigurations found in cloud applications. DevOps tools are incorporating security practices to apply controls for incident response, forensics, and threat hunting for identifying and remediating malware or vulnerabilities from deployment through to production.<\/p>\n Organizations report experiencing business-impacting consequences tied to attacks that occurred between initial detection and remediation time. As a result, they are looking for better tools that speed remediation to mitigate data loss, application downtime, business disruption, or customer data loss. Keep in mind, organizations are looking for these compatibilities as part of a suite or platform, not as another disparate tool in their already complex, distributed environments. We\u2019ll look a bit deeper into this.<\/p>\n To drive business growth, organizations need to be cost-conscious and efficient. Almost 100% of organizations agree that consolidation of tools is a priority to gain better context for faster and efficient remediation and response. Security programs must evolve to secure both cloud native application, and use of, public infrastructure to keep pace with development speed. This all comes as a broader effort to reduce complexity and take a unified cybersecurity posture.<\/p>\n Organizations overwhelmingly agree that purchase of cloud security platforms and DevSecOps over the next year is required, not optional. This investment extends across a wide variety of areas, including cloud workload protection platforms, application programming interface (API) security, application security testing tools, endpoint detection tools, posture management tools, and entitlement management solutions. Organizations selected a wide variety of features needed for a comprehensive cloud native application security program. These range from preventative controls to risk prioritization, ease and flexibility of deployment, and capabilities driving faster responses to threats and attacks.<\/p>\n The time to leverage suites and platforms procured from a smaller set of vendors to reduce complexity and improve security posture is now. To learn more about the security solutions in place to protect cloud infrastructure and applications today, along with the top challenges organizations face to defend against attack, read the full eBook from TechTarget\u2019s Enterprise Strategy Group.<\/p>\n We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n Cisco Security Social Channels<\/strong><\/p>\n Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n “}]]\u00a0\u00a0A new survey by Cisco and Enterprise Strategy Group reveals the true contours of cloud native application development and security\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n <\/p>\n","protected":false},"author":0,"featured_media":3404,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nKey Findings<\/strong><\/h2>\n
\nMisconfigurations remain a monster problem that needs attention
\nSecurity needs to scale to support both cloud native application development and runtime protection<\/p>\nMulticloud \u2013 the new normal <\/strong><\/h2>\n
Top issues with cloud applications<\/strong><\/h2>\n
Secure from the start<\/strong><\/h2>\n
DevSecOps to the rescue<\/strong><\/h2>\n
Better tools for faster remediation<\/strong><\/h2>\n
Security efficiency supports scale<\/strong><\/h2>\n
Investing in the future<\/strong><\/h2>\n
Taking the next step<\/strong><\/h2>\n
Key Findings<\/strong><\/h2>\n
\nMisconfigurations remain a monster problem that needs attention
\nSecurity needs to scale to support both cloud native application development and runtime protection<\/p>\nMulticloud \u2013 the new normal <\/strong><\/h2>\n
Top issues with cloud applications<\/strong><\/h2>\n
Secure from the start<\/strong><\/h2>\n
DevSecOps to the rescue<\/strong><\/h2>\n
Better tools for faster remediation<\/strong><\/h2>\n
Security efficiency supports scale<\/strong><\/h2>\n
Investing in the future<\/strong><\/h2>\n
Taking the next step<\/strong><\/h2>\n