Today, SIEM and security analytics solution provider AlienVault released the results of a survey conducted at the Black Hat 2018 conference. This survey—the “Black Hat 2018 Survey Report: Extortion, the Cloud, and the Geopolitical Landscape”—explores a range of topics including how the political climate affects cybersecurity and how enterprises react to digital extortion. In addition, it made shocking discoveries about the trend of enterprise cloud adoption.
AlienVault compiled their findings on digital extortion and cloud adoption based on a survey of 963 attendees of the Black 2018 conference. The report also drew from individual interviews with renown security experts in attendance. The key findings from the report include:
- 46% say security concerns continue to be the biggest obstacle to enterprise cloud adoption.
- 44% say cybersecurity concerns are motivating a reverse migration of certain data and operations back to on-premises from the cloud.
- 54% says the U.S. public sector infrastructure is not prepared for cyber attacks.
- 20% say it is “very unprepared.”
- 25% would not be able to determine if a digital extortion threat was legitimate or a bluff.
On the subject of digital extortion, AlienVault notes these attacks have a reputational aspect as well. The merest implication that an enterprise has suffered a data breach can trigger widespread panic. Studies show there are long-term debilitating effects of a data breach on enterprises’ financial health; the resultant fines and legal fees are often compounded by a loss of digital foot traffic and customer trust. With social media accelerating the rumor mill, digital extortion poses an even more serious threat than ever before.
As for cloud adoption, AlienVault notes the reverse migration does not indicate faults in the cloud architecture model. More likely it indicates enterprises failing to fully consider the implications of migrating to the cloud.
You can read the full Black Hat 2018 Survey Report: Extortion, the Cloud, and the Geopolitical Landscape by AlienVault here.
Latest posts by Ben Canner (see all)
- How to Enact and Maintain Enterprise-Level SIEM Optimization - February 22, 2019
- Key Findings – The Forrester Wave: Cloud Security Gateways, Q1 2019 - February 21, 2019
- What is Cross-Site Scripting? How Can You Prevent It? - February 20, 2019