Connect with us

TECHNOLOGY

The Need to Orchestrate New Identity Policies in the Cloud

Published

on

The Need to Orchestrate New Identity Policies in the Cloud

Cloud computing has played a pivotal role in navigating the digital transformation journey of businesses across the globe. 

However, the current multi-cloud and hybrid cloud management processes have created new challenges and hurdles for businesses leveraging the cloud. Whether it’s the absence of a defined interoperability standard or identity management for multi-cloud and hybrid cloud, many areas need reengineering to ensure seamless connectivity between cloud and on-premise identity systems. 

Also, when we talk about the predefined standards and policies, businesses can achieve greater flexibility and user experience as they’re assured that different hardware, software, and apps work in symphony. 

But, new standards have recently emerged in the identity and access management space that ensure smooth authentication and authorization across multiple clouds and applications. Nevertheless, there’s still scope for improvement through new identity policies. 

Let’s dig deeper into this and understand why there’s an immediate need for new identity policies in the cloud computing landscape. 

Why Won’t Conventional Identity Policies and Standards Work in 2022 and Beyond?

Artificial Intelligence On Premises vs Cloud

The entire internet is built on specific standards and protocols that allow us to access and interact with global content. Moreover, various encryption standards and data privacy policies have also accelerated the growth of secure information transfer, storage, and management. 

However, conventional identity policies are impotent regarding distributed authorization since cross-platform applications and cloud deployments require robust information security.  Hence, cloud security standards, including OpenID Connect and Cross-Domain Identity Management, help solve the issues and challenges of federated single sign-on (SSO) during cross-platform communications. 

Apart from this, cybercriminals are always hunting for new ways to sneak into a network, and they’re now targetting cloud deployments since most businesses now leverage the cloud. And the early standards, including security assertion markup language (SAML), aren’t robust enough to enable identity providers to authenticate and share authentication data between different platforms. 

Several new standards have emerged in the identity management landscape that helps organizations deal with the challenges of distributed authentication and authorization. 

OpenID Connect and System for Cross-Domain Identity Management helps seamlessly transfer authentication and authorization data between various applications and platforms with minimum risks of data breaches and thefts. 

Why are New Standards and Cloud Identity Policies Becoming the Need of the Hour?

In a competitive digital business landscape, where the growth of software as a service (SaaS) is encouraging the use of new identity standards and policies, businesses leveraging different clouds need to rethink their security infrastructure. 

Since most organizations rely on a combination of cloud-based and on-premises systems, managing secure access control becomes an uphill battle. Everything in this ever-expanding multi-cloud environment is distributed, and organizations run an endless number of applications on these distributed systems, each with its unique identity. Hence, managing identity security brings new challenges and hurdles. 

Although various cloud service providers are working to address identity orchestration and provisioning, businesses are still surrounded by unaddressed issues. Hence, a new standard and a robust set of data security and privacy policies in the identity landscape is the need of the hour to ensure secure data management on the cloud. 

How to Incorporate Robust Identity Policies in the Cloud? 

5 Cloud Computing Trends That Are Playing A Major Role in 2021 Beyond

  • By leveraging identity management through a reliable solution.

A robust CIAM can help businesses ensure a stringent level of security across multiple cloud platforms. 

A CIAM solution removes any chances of identity theft and identity-related security issues since it incorporates multiple authentication and authorization processes through multi-factor authentication (MFA). 

Apart from this, an identity management solution also provides risk-based authentication (RBA) /adaptive authentication, ensuring the highest security level in high-risk scenarios. 

  • By incorporating data governance and compliances.

When it comes to cloud security, businesses need to understand the importance of data governance. Data governance emphasizes threat detection, prevention, and mitigation. 

Businesses can identify potential threats by incorporating adequate data governance and regulations policies. Apart from this, enterprises leveraging the cloud must comply with various data security and privacy regulations, including the GDPR and the CCPA. With these compliances in place, businesses can ensure they offer maximum protection to their users, and sensitive data isn’t compromised. 

In Conclusion 

Information security should be the priority for businesses leveraging the cloud in the digitally-advanced modern world that runs on data as its primary fuel. 

Businesses can ensure robust security with adequate information security policies, primarily when relying on cloud storage. However, a lack of robust identity policies and standards may lead to compromised customer identities and sensitive business information. 

 

Businesses must put their best foot forward in incorporating the latest technologies to help establish reliable identity policies and standards to safeguard crucial information.


Source link

TECHNOLOGY

Cloud security tops 2023 cyber risks, according to UK senior executives

Published

on

Cloud Computing News

Cloud related risks top the list of cyber security concerns that UK senior executives say will have a significant impact on their organisations in 2023, according to PwC’s annual Digital Trust Insights.

The research is based on an extensive survey of global and UK business leaders looking at key cyber security trends for the year ahead. Some 39% of UK respondents say they expect cloud-based risks to significantly affect their organisation in 2023, more so than cyber risks from other sources such as laptop/desktop endpoints, web applications and software supply chain. 

A third (33%) of respondents expect attacks against cloud management interfaces to increase significantly in 2023, while 20% say they expect attacks on Industrial Internet of Things (IIoT) and operational technology (OT) to significantly increase in the next 12 months.

However, long-standing and familiar cyber risks remain on the horizon in 2023, highlighting the challenge facing businesses. Just over a quarter (27%) of UK organisations say they expect business email compromise and ‘hack and leak’ attacks to significantly increase in 2023, and 24% say they expect ransomware attacks to significantly increase. Nevertheless, cyber security budgets will rise for many organisations in 2023, with 59% of UK respondents saying they expect their budgets to increase.

Richard Horne, cyber security chair, PwC UK said: “In part the increase in cloud-based threats is a result of some of the potential cyber risks associated with digital transformation. An overwhelming majority (90%) of UK senior executives in our survey ranked the ‘increased exposure to cyber risk due to accelerating digital transformation’ as the biggest cyber security challenge their organisation has experienced since 2020.

“However, these digital transformation efforts – which include initiatives such as migration to cloud, moving to ecommerce and digital service delivery methods, the use of digital currencies and the convergence of IT and operational technology – are critical to future-proofing businesses, unlocking value and creating sustainable growth.”

Around two-thirds of UK senior executives say they have not fully mitigated the cyber risks associated with digital transformation. This is despite the potential costs and reputational damage of a cyber attack or data breach. Just over a quarter (27%) of global CFOs in the survey say they have experienced a data breach in the past three years that cost their organisation more than $1 million.

Cyber attack now seen as the biggest risk to organisations

The C-Suite is becoming more aware of how these complex cyber threats and the potentially damaging impact of them can pose a major risk to wider organisational resilience. Just under half (48%) of UK organisations say a “catastrophic cyber attack” is the top risk scenario, ahead of global recession (45%) and resurgence of COVID-19 (43%), that they are formally incorporating into their organisational resilience plans in 2023. This echoes the findings of PwC’s 26th annual CEO Survey, where almost two-thirds (64%) of UK CEOs said they are extremely or very concerned about cyber attacks impacting their ability to sell products and services.

Bobbie Ramsden-Knowles, crisis and resilience partner, PwC UK, said: “The potentially destructive impact of cyber threats such as ransomware have significant implications for the wider resilience of whole organisations. Only by taking a more strategic approach to resilience across high impact and increasingly plausible threats can organisations protect what matters most to business survival, reputation and ultimately build trust.”

Source link

Continue Reading

TECHNOLOGY

The Dark Side of Killer Drones

Published

on

The Dark Side of Killer Drones

Killer drones, also known as unmanned aerial vehicles (UAVs), have been a topic of much debate in recent years.

On one hand, these drones have the potential to be used for a variety of beneficial purposes, such as surveillance, search and rescue, and targeted killing of terrorists. On the other hand, there are serious concerns about the potential negative consequences of using killer drones, such as the loss of innocent lives, violation of international laws, and the psychological impact on both the drone operators and the communities affected. In this article, we will explore the dark side of killer drones.

Killer_Drone_Explained.jpg

Source: Crown Copyright/ BBC

1. More Innocent Casualties

One of the primary concerns about the use of killer drones is the risk of innocent casualties. Drones are often used in conflict zones, where the situation is often complex and fluid, making it difficult to accurately identify targets. As a result, there have been numerous reports of innocent civilians being killed or injured in drone strikes. For example, a report by the Bureau of Investigative Journalism estimated that between 384 and 807 civilians have been killed in drone strikes in Pakistan between 2004 and 2019.

2. Violation of International Laws

Another major concern about the use of killer drones is the potential violation of international laws. The use of drones in conflict zones raises questions about the legality of targeted killings, the right to due process, and the protection of civilians. The United Nations has called for greater transparency and accountability in the use of drones, and several human rights organizations have criticized the use of drones as a violation of international law. For instance, in 2013, a report by Human Rights Watch found that the US drone program in Yemen was violating international law, including the right to life and the prohibition against arbitrary killing.

3. Psychological Impact on Operators

The use of killer drones also has a significant psychological impact on the operators who are responsible for carrying out the strikes. Drone operators often suffer from symptoms of post-traumatic stress disorder (PTSD), anxiety, and depression. This is partly due to the fact that drone operators are often required to carry out long-distance killings, often for extended periods of time, and the fact that they are often isolated from the consequences of their actions. For example, a study by the University of Utah found that drone operators were more likely to experience symptoms of PTSD and depression compared to other military personnel.

4. Stronger Dammage on Communities

The use of killer drones also has a significant psychological impact on the communities affected by the strikes. The constant threat of drone attacks can cause significant stress and anxiety, leading to social and economic disruption. For instance, a report by the International Human Rights and Conflict Resolution Clinic found that drone strikes in Pakistan had a significant psychological impact on the local population, including symptoms of anxiety, stress, and depression.

Conclusion

Guide_to_Military_Drones_Cover.jpg

Sources: Thales, General Atomics, Northdrop Grumman, EMT Penzberg, Prox Dynamics | © DW

The use of killer drones raises serious concerns about the potential for innocent casualties, violation of international laws, and the psychological impact on both the drone operators and the communities affected. The negative consequences of using killer drones far outweigh the benefits, and it is imperative that steps are taken to limit their use and ensure greater transparency and accountability. The international community must work together to establish clear guidelines for the use of drones, to ensure that they are used only in a manner that is consistent with international law and human rights.

Source link

Continue Reading

TECHNOLOGY

Vodafone Ireland turns to Amdocs to drive enhanced customer experience

Published

on

Cloud Computing News

Duncan is an award-winning editor with more than 20 years experience in journalism. Having launched his tech journalism career as editor of Arabian Computer News in Dubai, he has since edited an array of tech and digital marketing publications, including Computer Business Review, TechWeekEurope, Figaro Digital, Digit and Marketing Gazette.


Vodafone Ireland has chosen Amdocs, a provider of software and services to communications and media companies, to transition its infrastructure and application workloads to the cloud, enabling an enhanced customer experience and rapid adoption of the latest 5G innovations.

Under the agreement, Amdocs Customer Experience Suite (CES) will migrate from Vodafone Ireland on-premise to the cloud, providing the Irish operator with greater flexibility and capacity to support its future growth.  

Mairead Cullen, CIO at Vodafone Ireland, said: “Moving to the cloud is a key part of our strategy as we look to become even more dynamic, agile and responsive to our customers’ needs. We have a long-standing relationship with Amdocs and we’re pleased to be collaborating with them on this important initiative.”

Anthony Goonetilleke, group president of technology and head of strategy at Amdocs, said: “By migrating its IT services infrastructure to the cloud, Vodafone Ireland can ensure it has the foundations in place to achieve growth and further enhance the experience of its customers.

“We are excited to be taking such a central role in the company’s cloud strategy.”

Want to learn more about cybersecurity and the cloud from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London.

Explore other upcoming enterprise technology events and webinars powered by TechForge here.

Tags: , ,

Source link

Continue Reading

Trending

en_USEnglish