Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity

    Security Vendors Say New Technologies Needed to Bolster Cloud Defenses

    Written by

    David Needle
    Published February 27, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN MATEO, Calif. – Much work remains to be done if security breaches such as those at Sony Pictures Entertainment and health insurer Anthem are to become a rare event.

      That was the consensus of security vendors speaking at the OnCloud 2015 conference here this week.

      While malicious hackers will continue working to crack the latest security schemes, Barmak Meftah, CEO of AlienVault said security could be greatly enhanced by enterprises sharing more information. “Imagine if we had a way to share threat data around the world,” he said. “For once we could be more proactive rather than reactive.”

      Only recently have companies become more forthcoming about data breaches, thanks largely to legislation and social media giving consumers an outlet to quickly spread the news that their personal accounts have been hacked and private information exposed.

      Meftah and other speakers at the conference expressed hope that recent cases like the Anthem data breach that exposed 80 million customer accounts will be a wakeup call that forces companies to cooperate on potential threats.

      Despite these high profile cases, security breaches could be far worse. Enterprises already spend millions on security technology, from anti-malware to firewalls to network monitors that watch for attempts by hackers to penetrate corporate networks. But Meftah said security product vendors have been too focused on marketing their technology to the biggest companies that can most readily afford the most sophisticated security system.

      “We’ve ignored a vast market,” said Meftah. “As vendors we love the Fortune 500 for their money, but for every one of them, there are 10,000 smaller firms that can’t afford those same solutions.”

      Another speaker said that identity management and authentication are the biggest security issues because a breach or other incursion is typically carried out by someone who by outright theft or subterfuge has gained access to someone else’s identity.

      “Companies view themselves as operating in islands of commerce, but really we live in a tornado of digital identities,” said Reed Taussig, CEO of ThreatMetrix.

      “Everyone is upset about malware, but we should accept the fact it’s a losing war because (the attacks) change every 20 to 25 minutes. The real problem is spoofing and stolen identities,” Taussig added. He then recounted that he himself has received four different requests in the past year to change his password from big companies that had been hacked, including Morgan Stanley and Starwood Hotels.

      When he asked the room of several hundred people if any of them hadn’t had at least one of these requests to change their password in the past year, only three hands went up. “Do you have electricity in your house?” he joked.

      ThreatMetrix’s effort to control the problems of network break-ins and data breaches involves a kind of crowd-sourced system covering 15,000 networks designed to identify threats, which employs what Taussig calls identity analytics. “There is no real danger of the customer losing their identity because we don’t know who you are,” he said.

      Meftah said firewalls are good for what they do, but that they are not enough. “Just because you have a door, that doesn’t mean you don’t also need an alarm for your house,” he said. He called for a shift in security systems from protective to “detective analytics.”

      David Needle
      David Needle
      Based in Silicon Valley, veteran technology reporter David Needle covers mobile, bi g data, and social media among other topics. He was formerly News Editor at Infoworld, Editor of Computer Currents and TabTimes and West Coast Bureau Chief for both InformationWeek and Internet.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.