The Cloud: Scaling Security and Insecurity By Dan Lohrmann and Bikash Barai.

The adoption of cloud technology holds immense promise for revolutionizing business operations and enhancing efficiency. However, amid this transition, there lies a critical vulnerability: the potential for insecure configurations and oversight in safeguarding data. In this discourse, we delve into the complexities of cloud security, exploring the transformative potential of cloud technology while acknowledging the current vulnerabilities that accompany its adoption.

 

 

 

Here is the verbatim discussion:

So I'm a big believer of cloud, and I believe that cloud in the long run is going to create a much more safer world if done right. And I am kind of very confident that we will do it right as an industry because, because there is business in there. So if there is a business driver, it will get done right. So. But in the interim, this time is very vulnerable because a lot of time, people who are just moving to the cloud are not aware of the configurations, the way it should be done. A lot of people are not aware of MongoDB having default. The default kind of configuration is insecure. So, like, since we monitor the kind of overall Internet, I recall, I guess there's around half a million open databases out there right now, which is quite crazy. People just did not configure it. 

 

Highlights:

The Potential of Cloud Technology: Cloud computing offers unparalleled opportunities for innovation and scalability in modern businesses. With its inherent flexibility and efficiency, the cloud promises to reshape industries and drive economic growth.

The Imperative of Proper Configuration: Despite the inherent benefits of cloud technology, the rush to adopt it often leads to oversight in configuration and security protocols. Many organizations moving to the cloud are unaware of default configurations that leave their data vulnerable to breaches and unauthorized access.

Vulnerabilities in Cloud Databases: One glaring example of this vulnerability is seen in MongoDB databases, where default configurations are often insecure. As a result, a staggering number of open databases—approximately half a million—are susceptible to exploitation due to improper configuration.

The Path to Enhanced Security: While vulnerabilities exist, there is optimism that the industry will evolve to address these challenges. Business imperatives drive innovation, and as organizations recognize the importance of securing their cloud environments, efforts to enhance security will intensify.

While cloud technology holds immense promise for the future, its adoption must be accompanied by a concerted focus on security. The prevalence of insecure configurations highlights the urgency for organizations to prioritize robust security measures in their cloud deployments. By raising awareness, implementing best practices, and leveraging industry advancements, we can harness the transformative power of the cloud while safeguarding against potential vulnerabilities, ultimately paving the way for a more secure digital landscape.

 
 

Speakers:

Dan Lohrmann is an esteemed cybersecurity expert and Field Chief Information Security Officer (CISO) for Presidio, celebrated for his impactful career across both public and private sectors. With beginnings at the National Security Agency and roles at Lockheed Martin and ManTech, he has been recognized as CSO of the Year among other accolades. Dan is also a prolific author and speaker, sharing insights on cybersecurity and technology modernization through his award-winning blog and publications.


https://twitter.com/govcso

https://www.linkedin.com/in/danlohrmann/


Bikash Barai
is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)