Research compiled for the latest Alert Logic State of Cloud Security Report showed an increase in attacks on both cloud and on-premises IT environments. And while the company maintains that the cloud is no less secure than on-premises infrastructures — attack types that more commonly targeted on-premises are now making their way to the cloud.
“The increase in cloud attacks that we observed is most likely correlated to the growth of cloud adoption in the enterprise,” said Stephen Coty, director of threat research at Alert Logic. “As more enterprise workloads have moved into cloud and hosted infrastructures, some traditional on-premises infrastructure threats have followed them. This reinforces the necessity for enterprise-grade security solutions specifically designed to protect cloud environments.”
As the leading provider of Security-as-a-Service solutions for the cloud, Alert Logic regularly conducts a comparative analysis of security threats across thousands of customers’ cloud and on-premises infrastructures. Results from this research are released in the company’s annual State of Cloud Security Report. The Spring 2014 edition is due for release next month.
Prior to the release of the Spring 2014 State of Cloud Security Report, Alert Logic will be hosting a series of local events across five major U.S. cities including San Francisco, Houston, Boston, New York and Chicago. At the events, security experts from Alert Logic will discuss the key findings of the report, including implications and best practices that will help customers maintain a more secure IT infrastructure. To sign up for an event near you please visit the registration page here.
In addition to the Alert Logic roadshow tour, the company will also take a deep dive into the Cloud Security Report research when it hosts a special webinar on April 15 at 11 am CDT. The webinar will examine key data pulled from the report, including:
- Trends in attack types, frequency, and diversity over time
- Differences between attacks targeting cloud and on-premises environments
- Exclusive analysis of attacks through the use of honeypot deployments in cloud environments
Click here to sign up for the State of Cloud Security webinar.