This month’s “must-reads” are focused on cloud security, and new security protocols and policies that are designed to protect enterprises. Take a read through these pieces if you’re looking to learn more about cloud security in the months (and years) ahead.
InfoWorld
A piece from analyst David Linthicum explores the U.S. Commerce Department's proposal for detailed reporting requirements for advanced AI developers and cloud providers to ensure the safety and cybersecurity resilience of AI technologies, potentially increasing costs and complexities for enterprises using cloud-based solutions while aiming to balance risk and innovation. While the intentions are good, the new regulations may present challenges for businesses related to compliance, costs, and potential impacts on workflows and innovation pipelines, urging them to collaborate with cloud service providers and prepare for proactive evolution alongside regulatory changes.
MIT News
New security protocol shields data from attackers during cloud-based computation
Deep-learning models are being used in many fields, from healthcare to financial services. However, these models are so computationally intensive that they require the use of powerful cloud-based servers. To solve for this, MIT researchers have developed a security protocol that leverages the quantum properties of light to ensure that data sent to and from a cloud server remain secure.
Network World
10-year forecast shows growth in network architect jobs while sysadmin roles shrink
The U.S. Bureau of Labor Statistics (BLS) is forecasting that “computer and mathematical occupations” will grow by more than 12% between now and 2033, increasing by 699,000 jobs. This growth is driven by continued development of AI solutions and an increasing amount of data available for analysis, as well as the rising number and severity of cyberattacks.
SC Media
Hackers use cloud services to target financial and insurance firms
It’s no secret that cyberattacks and threats are become more sophisticated. A new hacker network called “Scattered Spider” is seeking to breach corporate cloud instances to steal data. The group's tactics have shifted from traditional social-engineering techniques to utilizing methods like finding cloud access tokens in publicly available source code, purchasing lost credentials, and running phishing campaigns to compromise administrator or executive cloud service logins.
VentureBeat
Why Microsoft’s security initiative and Apple’s cloud privacy matter to enterprises now
With cyber threats growing more automated and malicious, securing enterprise data and privacy has never been more challenging. Apple and Microsoft‘s new security initiatives capitalize on their core cloud security and privacy strengths to close security gaps and reduce risk for every business.
What do you think of these stories? Are you seeing these trends play out in your organization?