Connect with us
CCW 2024

News

Kubernetes Deployments are Risking Complexity, Cost, and Data Loss

Published

on

Research commissioned by Veritas Technologies has found that businesses are failing to capitalise on the opportunities offered by joined-up strategies for Kubernetes deployments, leaving DevOps and project teams to solve challenges, like data protection, on their own. Over a third of UAE organisations (32%) have already deployed Kubernetes for mission-critical applications but this is often being driven at the project level, with 51% of Kubernetes adoption decisions being made without significant influence from the CIO or IT leadership team.

The 1,100 senior IT decision-makers surveyed for the research revealed that the adoption of Kubernetes is being driven by multiple parties: individual IT project teams (43%), Boards and business leaders (46%), DevOps (26%), and even cloud providers (27%). While IT leaders were identified as a stakeholder in the small majority of decisions, this was not the case 51% of the time.

Ramzi Itani, Regional Director at Veritas Technologies, said, “Containers have become the de facto standard for implementing microservices-based architectures to build web-scale applications with shorter development cycles. Without doubt organisations in the Middle East, today are choosing Kubernetes for their open-source container orchestration system. By automating containerized software deployment and management, Kubernetes offers a world of benefits for businesses – it’s affordable, flexible, scalable, and really easy to deploy. Development teams in the UAE want to embrace those benefits wholeheartedly. However, making that decision outside of a holistic IT strategy can mean that these projects miss the support of shared IT functions – such as data protection. Although the benefits of Kubernetes are vast, protection measures must keep pace so that Kubernetes doesn’t become the Achilles heel in businesses’ ransomware defense strategies.”

With 85% of organisations concerned about the threat of ransomware attacks on Kubernetes environments, having individual teams look after their data protection can be burdensome. Yet more than half (54%) of UAE organisations said that, where protection exists for their Kubernetes environments, they have standalone solutions that are distinct from their wider data protection infrastructures.

Survey respondents suggested this siloed approach risks complexity, cost, and data loss. 50% of organisations believed that siloed data protection leads to the threat of data being missed from protection sets. A similar number, 46%, cited more complex and lengthy data restoration processes and 51% pointed to increased costs. Ramzi Itani said, “Organisations often discover the pitfalls of siloed data protection when disaster strikes – such as when they’re hit by ransomware. Rather than having a single place to go to restore their data, the IT team is trying to recover from all sorts of platforms with different interfaces and procedures. To ensure they’re not burdened by this challenge, organisations in the UAE should take advantage of the opportunity to consolidate their current data protection platforms to cover their Kubernetes environments today, along with all other data wherever it resides.”

With 92% of organisations expecting to use Kubernetes in their mission-critical infrastructures in the next two to three years, Veritas is urging IT teams to collaborate more closely to ensure that the technology can be deployed with the appropriate protective guardrails around it. Ramzi Itani added, “As more data continues to move to the cloud, it becomes less visible to centralized data protection owners, who may be unaware that it’s there and needs protecting. Conversely, DevOps and project teams can feel like the easiest option to protect new data types is to deploy the native solutions from their cloud providers. However, they can often find a more robust, less complex and more cost-effective solution by partnering with their data protection team to extend the corporate data protection platform into these new environments.”

GISEC

Positive Technologies to Participate at GISEC 2024

Published

on

Positive Technologies will be showcasing its expertise at GISEC Global 2024, the Middle East’s largest information security exhibition, taking place April 23-25 in Dubai. The company will focus on their experience automating Security Operations Centers (SOCs) and how its MaxPatrol O2 metaproduct can automatically detect and stop cyberattacks before they cause significant damage. They will also present other key products and offer workshops throughout the event.

“Positive Technologies emphasizes the critical need for robust cybersecurity in the region. Their recent study identifies the Middle East, particularly the public sector, industrial enterprises, and fuel and energy industries, as prime targets for cybercriminals. To address this, they recommend a “result-driven” approach, building continuous and automated protection against critical threats identified by top management,” the company said in a statement.

“The rapid digitalization in the Middle East creates economic and social growth, but also attracts cybercriminals,” says Evgenia Popova, Director of International Business Development at Positive Technologies. “At GISEC, we’ll demonstrate ‘cybersecurity on autopilot’ with MaxPatrol O2. This empowers top management with confidence that their business is safe.” MaxPatrol O2 operates 24/7, requiring minimal manpower (potentially just one employee) to manage the work typically handled by a full SOC team in organizations of any size.

Continue Reading

Cyber Security

Data Stealers Are Hunting for User Credentials, Says Kaspersky

Published

on

As the malware development market continues to flourish with new stealers such as Lumma, for the last three years Redline still remains the dominant data-stealing malware used by cybercriminals. More than half of every device (55%) targeted by password-stealer attacks in 2023 has been infected with the Redline malware, Kaspersky Digital Footprint Intelligence finds.

Infostealers infiltrate devices to illicitly obtain sensitive credentials such as logins and passwords, which are then peddled on the shadow market, posing significant cybersecurity threats to personal and corporate systems. According to information gleaned from log files traded or distributed freely on the dark web, Redline was used in 51% of infostealer infections from 2020 to 2023. Other notable malware families included Vidar (17%) and Raccoon (nearly 12%). In total, around 100 distinct infostealer types were identified by Kaspersky Digital Footprint Intelligence between 2020 and 2023 using metadata from log files.

The underground market for data-stealing malware development is expanding, evident from the rising popularity of new stealers. Between 2021 and 2023, the portion of infections caused by new stealers grew from 4% to 28%. Specifically, in 2023, the new “Lumma” stealer alone was responsible for more than 6% of all infections.

“Lumma emerged in 2022 and gained popularity in 2023, through a Malware-as-a-Service (MaaS) distribution model. This means any criminal, even those without advanced technical skills, can purchase a subscription for a pre-made malicious solution and use this stealer to carry out cyberattacks. Lumma is primarily designed for stealing credentials and other information from cryptocurrency wallets, commonly spread through email, YouTube, and Discord spam campaigns,” said Sergey Shcherbel, an expert at Kaspersky Digital Footprint Intelligence.

To guard against data-stealing malware, individuals are advised to use a comprehensive security solution for any device. This will help prevent infections and alert them to dangers, such as suspicious sites or phishing emails that can be an initial vector for infection. Companies can help their users, employees and partners protect themselves from the threat by proactively monitoring leaks and prompting users to change leaked passwords immediately.

Continue Reading

Channel Talk

AmiViz Joins Signs Up with Abstract Security

Published

on

AmiViz has forged a partnership with Abstract Security, a cyber threat operations platform offering a revolutionary approach to security analytics that allows organisations to improve efficiency, reduce SIEM-related storage costs, and enhance detection and response capabilities across multi-cloud and on-premise environments. The Abstract platform disrupts traditional cybersecurity analytics with its innovative approach, challenging the limitations of conventional Security Analytics systems. Abstract Security offers a transformative cyber threat operations platform in an era marked by compliance-induced data swamps and redundant data storage.

“Engineered to streamline security analytics, it enhances detection and response capabilities across diverse IT environments, including multi-cloud and on-premise setups. By integrating tactical artificial intelligence (AI), Abstract empowers security analysts to decode complex cloud security data, improving detection strategies and filling visibility gaps. Pioneering initiatives like the decentralized edge computing platform and a one-click data lake further solidify Abstract Security’s position as a visionary player in cybersecurity,” the company said.

“The strategic expansion into Middle Eastern markets aligns with the region’s growing demand for advanced cybersecurity measures. With rapid digital transformation and increased cyber threats, the Middle East presents a significant opportunity for Abstract Security. Government investments in cybersecurity infrastructure and the adoption of IoT technologies amplify the demand for efficient, AI-driven security solutions,” the company added.

Ilyas Mohammed, COO at AmiViz, said, “Our partnership with Abstract Security heralds a new era in cybersecurity analytics. By leveraging their innovative solutions, we empower our clients with proactive threat management capabilities that surpass traditional systems. Together, we redefine industry standards, ensuring robust protection against evolving cyber threats and bolstering our position as leaders in the cybersecurity landscape.”

Richard Betts, Vice President of International Business at Abstract Security, commented on the strategic alliance, stating, ‘Our collaboration with AmiViz in the Middle East is more than a partnership; it’s a synergy of strengths. This venture not only amplifies our presence in a region but also marks a significant step in our journey to broaden Abstract Security’s international reach.

The companies claimed that the solutions are tailored for large enterprises in critical sectors like finance, oil and gas, telecommunications, MSSP and government, to address unique cyber threats. Abstract Security said it aims to integrate its solutions in local markets deeply through a channel-focused distribution strategy, empowering channel partners and addressing evolving security needs. The company added that it has partnered with AmiViz to provide comprehensive support, including technical training, marketing assistance, and dedicated account management, further strengthening Abstract Security’s position in the GCC markets.

Abstract Security’s partnership with AmiViz allows Middle Eastern channel partners to revolutionize security analytics, transcending traditional SIEM systems and compliance burdens. Together, they set a new standard for cybersecurity analytics, paving the way for proactive and predictive security measures. This partnership aims to position the Middle East as a cybersecurity stronghold, contributing to its global leadership in cybersecurity.

Continue Reading
Advertisement CCW 2024

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.