* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Wednesday, August 20, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    ‘The Lucky Ones’: Mae Ngai Sells Film & TV Rights To Neurosphere Entertainment – Deadline

    The Lucky Ones’: Mae Ngai Lands Thrilling Deal for Film and TV Adaptations

    Our picks for the best things to do in Cincinnati this week, Aug. 18-24 – Cincinnati Enquirer

    Unmissable Things to Do in Cincinnati This Week, Aug. 18-24

    Terence Stamp: from arthouse icon to blockbuster villain – yahoo.com

    Terence Stamp: From Arthouse Legend to Hollywood’s Ultimate Villain

    Community & Entertainment redefined: The summer fun continues with Villagio Hospitality! – WJLA

    Summer Fun Redefined: Create Unforgettable Moments with Villagio Hospitality!

    Iconic ‘M*A*S*H’ Actor, 86, Has Fans Swooning Over Resurfaced Images: ‘My Crush Since ’75’ – yahoo.com

    Iconic ‘M*A*S*H’ Actor, 86, Has Fans Swooning Over Resurfaced Images: ‘My Crush Since ’75’ – yahoo.com

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Thaddeus Stevens College of Technology kicks off return to school for Lancaster County colleges [photos] – LancasterOnline

    Thaddeus Stevens College of Technology Kicks Off an Exciting New School Year for Lancaster County Colleges [Photos]

    Empyrean Technology’s revenue climbs, but profit plunges 92% in EDA spending squeeze – digitimes

    Empyrean Technology’s Revenue Skyrockets as Profits Plunge 92% Amid EDA Spending Crunch

    5G-A technology provides strong support for China’s football sensation Suchao – Global Times

    How 5G-A Technology is Revolutionizing China’s Football Star Suchao

    AI’s backyard: A map of the 21st-century gold rush – EL PAÍS English

    The AI Frontier: Exploring the Thrilling Gold Rush of the 21st Century

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    ‘The Lucky Ones’: Mae Ngai Sells Film & TV Rights To Neurosphere Entertainment – Deadline

    The Lucky Ones’: Mae Ngai Lands Thrilling Deal for Film and TV Adaptations

    Our picks for the best things to do in Cincinnati this week, Aug. 18-24 – Cincinnati Enquirer

    Unmissable Things to Do in Cincinnati This Week, Aug. 18-24

    Terence Stamp: from arthouse icon to blockbuster villain – yahoo.com

    Terence Stamp: From Arthouse Legend to Hollywood’s Ultimate Villain

    Community & Entertainment redefined: The summer fun continues with Villagio Hospitality! – WJLA

    Summer Fun Redefined: Create Unforgettable Moments with Villagio Hospitality!

    Iconic ‘M*A*S*H’ Actor, 86, Has Fans Swooning Over Resurfaced Images: ‘My Crush Since ’75’ – yahoo.com

    Iconic ‘M*A*S*H’ Actor, 86, Has Fans Swooning Over Resurfaced Images: ‘My Crush Since ’75’ – yahoo.com

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Thaddeus Stevens College of Technology kicks off return to school for Lancaster County colleges [photos] – LancasterOnline

    Thaddeus Stevens College of Technology Kicks Off an Exciting New School Year for Lancaster County Colleges [Photos]

    Empyrean Technology’s revenue climbs, but profit plunges 92% in EDA spending squeeze – digitimes

    Empyrean Technology’s Revenue Skyrockets as Profits Plunge 92% Amid EDA Spending Crunch

    5G-A technology provides strong support for China’s football sensation Suchao – Global Times

    How 5G-A Technology is Revolutionizing China’s Football Star Suchao

    AI’s backyard: A map of the 21st-century gold rush – EL PAÍS English

    The AI Frontier: Exploring the Thrilling Gold Rush of the 21st Century

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

How to optimise cloud security without budget blowout

April 6, 2024
in Technology
How to optimise cloud security without budget blowout
Share on FacebookShare on Twitter

Budgets cannot stretch to accommodate infinite cost increases, not least to meet expanding cloud security requirements


Fleur Doidge

By

Fleur Doidge

Published: 05 Apr 2024

With Gartner forecasting another 20% jump in public cloud services spending and a 7% rise in overall IT spending for 2024, keeping the lid on budget sub-categories such as security for cloud applications and DevOps looks increasingly painful.

Neil Clark, cloud services director at managed services provider (MSP) QuoStar, says organisations often have not kept up, pointing to last year’s NetScaler breaches and unpatched vulnerabilities as an example.

Choosing from the array of tools is not easy, and some buy too many, often incompatible, offerings. Others simply pick a solution from the Gartner Magic Quadrant and spend six months trying to fine-tune it before realising it’s the wrong thing for their circumstances.

In the worst cases, organisations may simply continue like this until hit by an attack. So what’s the solution?

For Clark, it is about planning properly to pinpoint, implement and optimise appropriate solutions. An expert to understand it all – the wider perspective and then which bits fit together – can be necessary. No solution will stop everything or fit all, and cloud security cannot be a “tick-box” exercise if productivity is to be maintained and costs controlled.

“You need to be agnostically weighing up risk and aligning security need against operational need,” he notes. “It’s pointless having security overtake operations, not making money – but if you focus on operations too much, you expose yourself.”

Security sprawl can be caused more by “weird, convoluted” implementations of three to five tools where potentially one might have done the job, sometimes because the cloud environment has changed, or the organisation has at some point rushed away from on-premise rather than going deeper on cloud planning.

What’s needed is to clean all that up, reworking and layering security according to best practice, and adding essential mitigations, like backup. Getting transparency of the data environment can also prove crucial, Clark suggests.

“We’ve spent quite a bit of time rectifying that kind of thing for customers. Funnily enough, they don’t end up spending much more monthly,” says Clark. “Don’t just move your security problems into the cloud … not everything will work cloud-native. [Think about] what needs to access your applications and what doesn’t.”

Andrew Green, research analyst for networking and security at GigaOm, recommends choosing cloud-native security services from an appropriate stack as key to optimising cloud security from a cost perspective.

Open source container network interfaces (CNIs) for Kubernetes and containers, like Calico and Cilium, have “excellent” security capabilities for access controls and traffic filtering, all done at the network layer without any other agents or components.

“When you do networking in Kubernetes, they don’t offer native capabilities,” Green points out.

 Although CNIs can be rather technical solutions requiring configuration and potentially an augmented skillset, they can handle communications within bots or clusters and across clusters, and can help define policies, determining what needs to talk to each other’s access controls, doing security based on identity.

“Rather than saying, ‘I want to block this IP resource from access’, you can assign a label to a workload,” says Green. “And you do it very close to the Linux kernel. It’s lightweight, you get a lot of control, and you can do a bunch of stuff.”

If configuring CNIs with the command-line interface or through an integration is too challenging, perhaps opt for working via the graphical user interface (GUI). Calico et al offer good technical documentation, labs and training to assist, he says.

Alternatively, closed-source capabilities can be part of a wider solution such as F5, if that’s already in-house, Green suggests.

Reduce exposure

Be aware of and limit exposed and vulnerable resources. If not exposed to the public internet, the organisation may only need “simple and straightforward” ingress filtering. Web and public internet-exposed services for consumers or third parties require more sophisticated ingress filtering features that come at a price.

Protection from Yahoo! filter bots or shopper traffic distributed denial of service (DDoS) can require a “heavy investment”, Green points out.

“This is not specifically for compliance, but for the general security posture,” he adds. “If everything you’re exposed to is just maybe a partner API [application programming interface], you may just need some API protection that can validate requests.”

Also, do not lift and shift on-prem thinking. For example, deploying a full firewall or next-gen firewalling appliances to create cloud segments is expensive and inefficient. It’s better to look for technologies that use cloud-native attributes like labels or tags that can migrate with the workload, says Green.

Kris Lovejoy, global security and resilience leader at Kyndryl, opines that cloud security has often been held back by legacy-related challenges, and that is partly why the years-ago talk of “massive security benefits”, alongside performance and scalability of cloud, have not played out as predicted.

The need to refactor applications to be cloud-native has often been neglected.

“Refactoring can be a very difficult discussion with boards and executive management,” she says. “But legacy apps contain hard-coded credentials, insecure configurations, outdated encryption methods and, often when you move into cloud, containerisation.“

Legacy applications can often present the same vulnerabilities as they would have in an on-prem environment, on top of which is layered the encapsulated complexity of containerisation. Containerisation is itself a source of “massive amounts” of potential configuration-related exposures, Lovejoy explains.

While organisations recognise the security issues, how applications – often poorly performing legacy solutions – and environments have been built and deployed has often left huge amounts of technical debt.

How far behind are some? When it comes to cloud development processes, Enterprise Strategy Group polling found a third of respondents’ security teams had insufficient visibility and control, missed security checks and testing of releases, lacked consistent cross-team security processes, skipped security to meet deadlines, or deployed with misconfigurations, vulnerabilities and “other security issues”.

Ensure sound basics

Lovejoy notes that multiple hybrid cloud environments need integration to deliver the portability and interoperability that’s needed. Often, even the dream of advanced analytics suffers as a result.

“That complexity has resulted in costs that were utterly unexpected. However, it was not optimised for cloud,” says Lovejoy. “They have resource inefficiency, poor utilisation, and higher cloud and hosting costs, because of huge consumption.”

They are in a kind of IT poverty trap, if you will. Spending on security can, in such circumstances, feel like an unwanted extra.

For Lovejoy, the best fix might involve rowing back on what is often termed modernisation – going backwards – for the sake of building a stronger foundation on which to ultimately build. Even if that means going to private cloud or on-prem, then restarting the big cloud moves down the track.

“Cloud can provide benefits, security and resiliency, but the organisation may need to apply appropriate investment in actual refactoring of applications,” she says, “as opposed to cobbling together lots of security controls, for example.”

This is “particularly relevant” considering the expansion and scope of emerging regulation, including on data use and transparency.

Instead of narrowly focusing on security separate from the rest, Lovejoy suggests, organisations must think through what their “minimum viable business services” are to enable their operation of organisations, data and systems. Map all that out, then prioritise security resilience around that.

That’s where organisations should invest to ultimately optimise cloud costs, including security, she emphasises.

 “While zero trust is great, it really should be implemented within the context of more modern architecture. Consider the basics – do you have multifactor authentication (MFA), training and good patching? – before you get to ZTNA [zero-trust network access].”

Read more on Infrastructure-as-a-Service (IaaS)


Sidecarless Istio Ambient Mesh clears cloud interop hurdle

BethPariseau

By: Beth Pariseau


Green coding – Ryan Mangan: The role of energy efficiency in development

AdrianBridgwater

By: Adrian Bridgwater


The Security Interviews: Cyber security is about managing risk effectively

MelisaOsores

By: Melisa Osores


Legacy kit undermining sustainability efforts

By: Simon Quicke

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Computer Weekly – https://www.computerweekly.com/feature/How-to-optimise-cloud-security-without-budget-blowout

Tags: cloudOptimisetechnology
Previous Post

Five key principles for data insight success

Next Post

Helldivers 2 players have become walking matchsticks following recent fire buff

High blood pressure coupled with this common lifestyle mistake may increase cancer and early death risk – Times of India

High blood pressure coupled with this common lifestyle mistake may increase cancer and early death risk – Times of India

August 20, 2025
Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

August 20, 2025
2025 Best NFL Linebackers: Fred Warner, Roquan Smith Lead Top 10 Rankings – FOX Sports

Top 10 NFL Linebackers of 2025: Fred Warner and Roquan Smith Lead the Pack

August 20, 2025
Men’s Freestyle Team Standings At The 2025 U20 World Championships – FloWrestling

Exciting Men’s Freestyle Team Rankings Revealed at the 2025 U20 World Championships

August 19, 2025
The Weaponized World Economy: Surviving the New Age of Economic Coercion – Foreign Affairs

The Weaponized World Economy: Surviving the New Age of Economic Coercion – Foreign Affairs

August 19, 2025
1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

August 19, 2025
Allegheny County Health Department identifies first human case of West Nile virus in 2025 – CBS News

Allegheny County Health Department identifies first human case of West Nile virus in 2025 – CBS News

August 19, 2025
Hear why Zakaria calls Trump-Putin summit ‘cringeworthy’ – CNN

Hear why Zakaria calls Trump-Putin summit ‘cringeworthy’ – CNN

August 19, 2025
Sliteye shark discovered in remote Indian Ocean — First-ever sighting in Chagos Archipelago – EurekAlert!

Sliteye shark discovered in remote Indian Ocean — First-ever sighting in Chagos Archipelago – EurekAlert!

August 19, 2025
180 Years of Standing Up for Science – Scientific American

180 Years of Standing Up for Science – Scientific American

August 19, 2025

Categories

Archives

August 2025
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Jul    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (779)
  • Economy (801)
  • Entertainment (21,679)
  • General (16,563)
  • Health (9,840)
  • Lifestyle (813)
  • News (22,149)
  • People (802)
  • Politics (809)
  • Science (16,013)
  • Sports (21,300)
  • Technology (15,782)
  • World (783)

Recent News

High blood pressure coupled with this common lifestyle mistake may increase cancer and early death risk – Times of India

High blood pressure coupled with this common lifestyle mistake may increase cancer and early death risk – Times of India

August 20, 2025
Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

August 20, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version