{"id":94759,"date":"2023-06-30T19:48:34","date_gmt":"2023-06-30T19:48:34","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4127097"},"modified":"2023-06-30T19:48:34","modified_gmt":"2023-06-30T19:48:34","slug":"gigamons-cloud-security-report-shares-insights-on-undetected-breaches-deep-observability","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=94759","title":{"rendered":"Gigamon\u2019s Cloud Security Report Shares Insights on Undetected Breaches &amp; Deep Observability"},"content":{"rendered":"<figure id=\"attachment_4127099\" aria-describedby=\"caption-attachment-4127099\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4127099\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/06\/gigamons-cloud-security-report-shares-insights-on-undetected-breaches-deep-observability.jpg\" alt=\"Global cloud security image concept.\" width=\"1240\" height=\"827\"><figcaption id=\"caption-attachment-4127099\" class=\"wp-caption-text\">Image: UnderhilStudio\/Shutterstock<\/figcaption><\/figure>\n<p>Findings in network intelligence firm Gigamon\u2019s <a href=\"https:\/\/www.gigamon.com\/content\/dam\/gated\/wp-gigamon-survey-hybrid-cloud-security-2023.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Hybrid Cloud Security Survey report<\/a> suggest there\u2019s a disconnect between perception and reality when it comes to vulnerabilities in the hybrid cloud: 94% of CISOs and other cybersecurity leaders said their tools give them total visibility of their assets and hybrid cloud infrastructure, yet 90% admitted to having been breached in the past 18 months, and over half (56%) fear attacks coming from dark corners of their web enterprises.<\/p>\n<p>The report is an annual survey of more than 1,000 IT and security leaders from across the U.S., EMEA, Singapore and Australia.<\/p>\n<p>Jump to:<\/p>\n<h2 id=\"key\">Key to understanding hybrid cloud security<\/h2>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<p>While nearly all respondents (96%) to Gigamon\u2019s poll said cloud security is dependent on gaining visibility across all data in motion, 70% of the CISOs and security operators queried said they lack visibility into encrypted data. One-third of CISOs lack confidence about how their sensitive data is secured.<\/p>\n<p>Chaim Mazal, chief security officer at Gigamon, said most companies exist in the hybrid cloud. \u201cAs of today, I would venture to say 90% of the global Fortune 5,000 are operating in hybrid cloud environments,\u201d he said. \u201cThey may have started with private clouds first, then the public cloud, then AWS, GCP and\/or Azure for different purpose-driven use cases.\u201d<\/p>\n<p>Mazal said the key to understanding what is happening to security across hybrid clouds is deep observability.<\/p>\n<p>\u201cVisibility is a key problem across the board \u2014 you can\u2019t secure what you don\u2019t have insights into,\u201d Mazal said. \u201cIf you look at the largest causes of breaches, they are systems that have existed for a long time at enterprises that are not part of a monitoring regime. So having end-to-end visibility is something CISOs strive for on a daily basis.\u201d<\/p>\n<p><strong>SEE: Palo Alto Networks\u2019 Ankur Shah on the <a href=\"https:\/\/www.techrepublic.com\/article\/palo-alto-networks-prisma-shifting-left\/\">dangers of a traditional approach to cloud security<\/a> (TechRepublic)<\/strong><\/p>\n<h2 id=\"what\">What is deep observability?<\/h2>\n<p>Mazal explained that deep observability, a term coined by Gigamon, denotes network-level intelligence that is immutable: \u201cWe take metadata from across network-level environments and route that data into observability tools through smart workflows and routing.\u201d<\/p>\n<p>He added that the web is in the early stages of creating end-to-end visibility, regardless of asset classes.<\/p>\n<p>\u201cWith network-level metadata, you get 100% validated data sources that can\u2019t be altered,\u201d Mazal said. \u201cWe know that security logs are a great source of data; [however,] they are subject to such exploits as log forging, whereby a nefarious actor tampers with security logs to cover their tracks. With network-level intelligence, you can\u2019t do that because it comprises data validated from beginning to end being fed to your toolsets.\u201d<\/p>\n<h2 id=\"collaboration\">More cybersecurity collaboration needed to protect hybrid cloud environments<\/h2>\n<p>While 97% of respondents said they are able to collaborate across IT teams for vulnerability detection and response, one in six said they do not practice collective accountability because their security operations are siloed. Additionally, the poll suggests CISOs\/CIOs aren\u2019t feeling supported in the boardroom: 87% of respondents in the U.S. and 95% in Australia said they are worried their boardrooms still don\u2019t understand the shared responsibility model for the cloud.<\/p>\n<p>Many respondents said achieving collective accountability is difficult because they can\u2019t see critical data from their cloud environments:<\/p>\n<ul>\n<li>More than a quarter (26%) of respondents conceded they do not have the right tools or visibility (<strong>Figure A<\/strong>).<\/li>\n<li>52% said they have no visibility into east-west traffic \u2014 network traffic among devices within a specific data center.<\/li>\n<li>35% (38% in France and 43% in Singapore) said they have limited visibility into container traffic.<\/li>\n<\/ul>\n<p><strong>Figure A<\/strong><\/p>\n<figure id=\"attachment_4127108\" aria-describedby=\"caption-attachment-4127108\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4127108\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/06\/gigamons-cloud-security-report-shares-insights-on-undetected-breaches-deep-observability-1.jpg\" alt=\"IT and security teams admit a number of known visibility gaps across their IT infrastructure.\" width=\"837\" height=\"800\"><figcaption id=\"caption-attachment-4127108\" class=\"wp-caption-text\">IT and security teams admit a number of known visibility gaps across their IT infrastructure. Image: Gigamon<\/figcaption><\/figure>\n<p>In spite of these statistics, 50% of those polled said they are confident they are sufficiently secure across their entire IT infrastructure, from on-premises to the cloud. Mazal said this latter point was surprising.<\/p>\n<p>\u201cThose two things don\u2019t align,\u201d Mazal explained. \u201cBased on the study, there is a false sense of security but, again, we can\u2019t account for those blind spots \u2013 being able to solve for them is a key to finding a path forward. Yes, you might have a lot of confidence but not the full picture; if you did, you could go ahead and take appropriate actions and build legitimate confidence. But unfortunately, you don\u2019t know what you don\u2019t know, and sometimes ignorance is bliss.\u201d<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/withsecure-cybersecurity-report-flawed\/\">Cybersecurity unaligned with business goals is reactive \u2026 and flawed<\/a> (TechRepublic)<\/strong><\/p>\n<p>The survey found several points of fear keeping CISOs up at night, with 56% of respondents saying attacks coming from unknown vulnerabilities were top stressors (<strong>Figure B<\/strong>).<\/p>\n<p><strong>Figure B<\/strong><\/p>\n<figure id=\"attachment_4127110\" aria-describedby=\"caption-attachment-4127110\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4127110\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/06\/gigamons-cloud-security-report-shares-insights-on-undetected-breaches-deep-observability-2.jpg\" alt=\"Blind spots, attack complexity and legislation are keeping CISOs up at night.\" width=\"791\" height=\"800\"><figcaption id=\"caption-attachment-4127110\" class=\"wp-caption-text\">Blind spots, attack complexity and legislation are keeping CISOs up at night. Image: Gigamon<\/figcaption><\/figure>\n<p>34% of respondents to the Gigamon survey said legislation was a top stressor for them, specifically the EU Cyber Resilience Act. 32% of CISOs said attack complexity was a key fear. One-fifth of respondents said their teams were unable to identify the root causes of breaches.<\/p>\n<p>Additionally, only 24% of global enterprises have banned or are looking into banning <a href=\"https:\/\/www.techrepublic.com\/article\/chatgpt-cheat-sheet\/\">ChatGPT<\/a>, 100% are concerned about TikTok and the metaverse, and 60% have banned the use of WhatsApp due to cybersecurity concerns.<\/p>\n<h2 id=\"education\">Education and investment concerns? Not so much<\/h2>\n<p>What is not worrying security teams is a lack of cyber investment \u2013 only 14% of respondents articulated this fear in Gigamon\u2019s survey. In addition, only 19% said security education for staff was critical.<\/p>\n<p>Security leaders in France and Germany, however, bemoaned the scarcity of hybrid cloud cybersecurity skills in their workforces: 23% and 25% of respondents, respectively, said they require more people with these skills. Finally, legislation is a particular issue for leaders in the U.K. and Australia: 41% in the U.K. and 59% in Australia said they were concerned with changes in cyber laws and compliance.<\/p>\n<h2 id=\"zero-trust\">Zero trust awareness on the rise<\/h2>\n<p>The <a href=\"https:\/\/www.techrepublic.com\/article\/zero-trust-security-a-cheat-sheet\/\">zero trust framework<\/a>, as Deloitte explained in a 2021 <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/risk\/deloitte-cyber-zero-trust.pdf#:~:text=Zero%20Trust%20is%20a%20framework%20for%20looking%20at,individual%20resources%20and%20consumers%2C%20as%20and%20when%20needed\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a>, applies across an enterprise\u2019s network and user authentication processes a basic principle of \u201cnever trust, always verify.\u201d In Gigamon\u2019s <a href=\"https:\/\/www.gigamon.com\/resources\/resource-library\/white-paper\/wp-gigamon-report-state-of-ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">State of Ransomware for 2022 Report<\/a>, 80% of CISOs\/CIOs said zero trust would be a major trend. In this new study, 96% now believe the same for 2023 and beyond. Also, 87% of respondents said zero trust is spoken about openly by their boards, a 29% increase compared to 2022.<\/p>\n<p>\u201cZero trust is not a product \u2013 it\u2019s a methodology,\u201d said Mazal. \u201cFor a long time, we didn\u2019t have a clear idea of what that was, but <a href=\"https:\/\/www.cisa.gov\/zero-trust-maturity-model\" target=\"_blank\" rel=\"noopener noreferrer\">structured outlines by the federal government<\/a> have given us a good understanding of what that layered approach is today around assets, identity and&nbsp; perimeter, blended in one approach.\u201d<\/p>\n<p>He said network-level insights that are validated across the board and can be fed to IT tools are important pillars. \u201cImmutable data streams across tools is key to zero trust implementation at the enterprise level.\u201d<\/p>\n<h2 id=\"how\">How to close the perception\/reality gap<\/h2>\n<p>The Gigamon study\u2019s authors said ensuring data that provides deep observability is fed to traditional security and monitoring tools can help eliminate blind spots and close the gap between what security leaders believe about their organizations\u2019 security postures and reality.<\/p>\n<p>\u201cThe first stage to bolstering hybrid cloud security is recognizing that many organizations are suffering from a perception vs. reality gap,\u201d noted the report.<\/p>\n<h2 id=\"checklist\">A checklist manifesto for IT<\/h2>\n<p>As part of a visibility strategy, IT teams should regularly update network documentation to better administer maintenance, support and security routines. Regular audits garnering information from every node on the network constitute a strong defense against patch and update lapses.<\/p>\n<p>TechRepublic Premium\u2019s <a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/checklist-network-documentation\/\">network documentation checklist<\/a> shows how checklists can be integrated with each audit. Available as a PDF and Word document, it will help you document your key assets, from voice equipment to storage infrastructure to battery backups. Learn more about it <a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/checklist-network-documentation\/\">here<\/a>.<\/p>\n<p> <!-- default newsletter at the end --> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: UnderhilStudio\/Shutterstock Findings in network intelligence firm Gigamon\u2019s Hybrid Cloud Security Survey report suggest there\u2019s a disconnect between perception and reality when it comes to vulnerabilities in the hybrid cloud: 94% of CISOs and other cybersecurity leaders said their tools give them total visibility of their assets and hybrid cloud infrastructure, yet 90% admitted to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":94761,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[490,134,283,40,788,783,287],"tags":[],"class_list":["post-94759","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-australia","category-aws","category-azure","category-cloud","category-cloud-security","category-cloudsync","category-security"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/94759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=94759"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/94759\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/94761"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=94759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=94759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=94759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}