New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

6 cloud security trends to watch for in 2022

New York Tech Editorial Team by New York Tech Editorial Team
January 10, 2022
in Cybersecurity
0
Increased connectivity: What’s in store for 2022?
Share on FacebookShare on Twitter

It’s fascinating to take a step back and look at how “the cloud” developed over the last two decades. There has been a lot of innovation that has sparked a new wave of technologies – from the boom in serverless technologies (allowing firms to scale and build platforms at speeds never seen before) to the evolution of cloud automation security.

cloud security trends 2022

These innovations have enabled organizations to improve business agility and reduce costs; but they’ve also increased the attack surface as demonstrated by a recent IDC report, which highlights that 98% of organizations suffered at least one cloud security breach in the previous 18-months.

Based on these variables, below are the top cloud security trends expected to emerge in 2022.

The growth of serverless

We are seeing more and more organizations adopt a serverless architecture in their platforms. This translates into not just utilizing cloud service providers’ FaaS (Function as a Service) services, but also digging into the wide range of serverless offerings that are available. With new serverless offerings being introduced quarterly, it’s so important to understand the potential risks that may arise.

For example, AWS Pinpoint is an AWS service that offers an email, SMS messaging and marketing tool that is easy to set up and start integrating Lambda, API gateway, etc. With a myriad of integration options and features, it’s important for application developers and the cloud IT team to understand what the security configuration would look like, and the potential risks associated with these tools.

We also see things like “distroless” architectures being utilized to have more control over FaaS architectures across multiple CSPs. With increased control of these types of architectural decisions comes a new way to think about security. We have our eyes glued to these new models and are looking at how to think about security when more serverless services are being utilized. For this coming year we are keeping a close eye on serverless, and how best to secure it, while enhancing efficiencies and mitigating risks.

DevSecOps

More organizations are starting to fully adopt Infrastructure-as-Code (IaC) to create fully autonomous cloud-based environments. From a security perspective, ensuring that the supply chain from the code to production is protected and monitored is becoming an increasing concern for organizations. We are seeing tools in this space starting to mature, and new strategies are being implemented. For example, you can do things like pre-validation of configurations and architecture, ensuring your architecture and code are compliant and secured before it even moves to production. In the coming year we are hoping to see more third-party tools being introduced and native cloud-based services to better support the overall supply chain.

More multi-cloud

Multi-cloud strategies are here to stay – and many enterprises are picking technologies best suited for their platforms while also creating resilient architectures that utilize more than one cloud service provider. We will soon see this adoption model mature along with multi-cloud security practices and tools. Additionally, we see “multi-cloud” enveloping edge computing, which will continue to extend onto factory floors, as well as into branch offices and private data centers. We are monitoring this area’s growth and developing new ways to adopt a multi-cloud strategy for organizations.

Applistructure

The lines between the application developer and infrastructure engineer have become very blurred. Developers are creating cloud architectures based on the services that they are trying to utilize, or creating new infrastructure from their codebase. Cross-functional teams are starting to work together to think about how security plays a role in this newer way of thinking. We’ve discovered potential new attack vectors and security configurations that have helped customers understand the impact. We see this trend continuing.

SaaS security

This past year we have seen a huge spike in breaches utilizing SaaS platforms. With this increase, we have also seen the growth of SaaS security offerings and tools as a response. One of those areas is SaaS Security Posture Management (SSPM) tools.

SSPMs are helping organizations dive into their overall SaaS portfolio to ensure they are keeping a pulse on the activity while remaining in compliance. In 2021, we saw these SSPMs adopt about a dozen or so platforms, but in 2022 we will see a significant increase in the number of SaaS platforms supported by these tools. Organizations are starting to create a stronger SaaS security program that can encompass their entire portfolio, from the onboarding and validation of cloud-based vendors to the monitoring and alerting of SaaS vendors in their ecosystem.

Dynamic access policies with attribute-based access control (ABAC)

ABAC leverages tags to dynamically determine access permissions. For example, if I have a tag “project”, I can construct a policy that grants permissions if the value of tag “project” on the principal matches the value of the same tag “project” on the target resource or environment. This allows for more scalable and reusable policies, simplifying management, and improving permission segregation. While many cloud service providers have not yet implemented this new approach across all services (minimizing its utility), we’re excited to see how this new approach grows in its adoption and support in the coming year.

With more organizations employing a work-from-home and hybrid environments and moving workloads and data to the cloud, securing cloud-enabled infrastructure needs to be built in from the start. The cloud is an enabler of business productivity, yet it must be used with a security-first approach to minimize risk while concurrently advancing productivity.

Credit: Source link

Previous Post

Unified communications market size to reach $344.84 billion by 2028

Next Post

Delivery Startup Used This 10-Slide Pitch Deck to Land $20m

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Delivery Startup Used This 10-Slide Pitch Deck to Land $20m

Delivery Startup Used This 10-Slide Pitch Deck to Land $20m

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Global Funeral Traditions Meet Technology

Global Funeral Traditions Meet Technology

March 9, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Recommended

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media