Security Pros Fear Insider Attacks Stem from Cloud Apps

  /     /     /  
Publicated : 23/11/2024   Category : security


Security Pros Fear Insider Attacks Stem from Cloud Apps


More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.



Security professionals consider cloud applications more vulnerable to insider attacks and say insider threats are more difficult to detect since migrating to the cloud, new survey data shows.
In a survey of more than 300 security pros conducted by Cybersecurity Insiders and sponsored by Securonix, 70% report insider attacks have become more frequent in the past year and 21% have experienced more than five insider attacks in the same time frame. More than half (56%) say monitoring, detecting, and responding to insider threats is somewhat effective or worse.
Many seem to think cloud applications are to blame: Thirty-nine percent identified cloud storage and file-sharing apps as the most vulnerable to insider attacks, and 56% believe detecting insider attacks has grown significantly or somewhat harder since they migrated to the cloud. Despite the perceived risk, only 40% monitor user behavior across their cloud environments.
Nearly 70% of respondents said they feel moderately to extremely vulnerable to insider threats, the top motivations for which are fraud, financial gain, IP theft, corporate sabotage, and espionage. When asked about individuals who pose the greatest risk for insider attacks, 59% pointed to privileged IT users or admins, followed by contractors/service providers/temp workers (52%).
Read more details
here
.
Check out 
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
Is Voting by Mobile App a Better Security Option or Just A Bad Idea?
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Security Pros Fear Insider Attacks Stem from Cloud Apps