Encryption and key management
In my experience, most conversations about security in the cloud conclude by discussing encryption and key management. No matter what topics a conversation starts with, such as vulnerabilities, exploits, malware, internet-based threats, or government access to data, they conclude by discussing encryption and key management. This is because encryption is recognized and proven to be a powerful data protection control that helps provide confidentiality and integrity for data whether it’s in the cloud, hybrid environments, or on-premises.
No matter which cybersecurity strategy or combination of strategies organizations pursue, when the rubber hits the road, protecting the data is the objective. That’s what can be so distracting about the cybersecurity strategies we examined that are proxies for data protection. Security teams get so focused on protecting endpoints or applications that they can lose sight that the underlying objective is...