IT disaster recovery, cloud computing and information security news

Daisy

The 2015 Cloud Security Report research shows large increase in application attacks against cloud deployments

Alert Logic has announced the availability of its latest 2015 Cloud Security Report. In the report, Alert Logic employed ActiveAnalytics, its big data security analytics engine, to analyze one billion events in the IT environments of more than 3,000 of its customers between January 1st and December 31st, 2014 to identify more than 800,000 security incidents. Insights were gleaned from customer environments representing all deployment models – on premises, in the cloud and hosted, and a vast array of market segments and industries.  The analysis of the data uncovers many findings including ones that point to new trends in cyber security, the validation of findings from previous reports and deeper insight into how cyber attackers operate and how companies can better and more proactively secure their IT environments.

Some key findings in the new report include the following:

  • The most common cyber attack methods aimed at cloud deployments grew 45 percent, 36 percent and 27 percent respectively over the previous year, while top attacks aimed at on-premises deployments remained relatively flat. Alert Logic attributes this increase in cloud attacks as being driven by the overall strong adoption of cloud computing platforms. In other words, cyber criminals are logically attempting to break into a growing number of applications being deployed in the cloud.
  • The type of cyber-attack perpetrated against a company is determined more by how it interacts with its customers and the size of its online presence than by where its IT infrastructure resides. Understanding this threat profile can help a company determine which type of cyber-attack it is most vulnerable to, as well as the type and size of the security investment required to keep it safe.
  • Understanding the ‘Cyber Kill Chain’ can give insight into where cyber criminals are more likely to breach a company's environment and how they can be stopped. This representation of the attack flow can help organizations target a protective strategy based on the way attackers approach infiltrating their businesses.

To access the report, click here (registration required).



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.