|
August 01, 2019 - Dubai, UAE 'Security experts and business leaders are scratching their heads today. It appears that Capital One’s breach was an exploit of a configuration issue in a firewall, something that's typically rectified by routine security audits and controls. This significant breach shows how today's enterprise security deployments are increasingly complicated, with the use of various cloud platforms and access to sensitive data as examples. Another important fact is that more and more individuals outside of an organization have knowledge of how enterprise systems work and how organizations maintain and access their data in the cloud, giving them insider views that could be used for nefarious purposes. These complexities put a spotlight on establishing the right controls and business processes to continuously test and stress an organization’s security posture as the risk landscape is always evolving.' Homayun Yaqub, Senior Director of Strategy at Forcepoint (Formerly a security executive at a large financial services firm) 'You used to be able to draw solid lines around your systems and infrastructure. As soon as you deploy to a cloud system, you immediately erase those dark lines. It means you fundamentally need to change how you approach security. This drives toward having to look at the anomalies rather than looking at the perimeter.' Stuart Taylor, Senior Director, Forcepoint Security Labs
|