Threats: Figure 2 shows that the greatest
Posted: Wed Feb 12, 2025 9:09 am
Despite the high assessment of the significance of the impact of digital transformation on business, respondents consider organizational difficulties and limitations associated with legacy technologies to be a serious obstacle to the development of digital transformation, and for the overwhelming majority (85%) of them, the main problems in implementing digital transformation are related to ensuring information security.
concerns among the professionals surveyed are hard-to-block polymorphic cyberattacks and the documented rise in the use of DevOps methodology, which, while accelerating the pace of company development, also increases the risk that vulnerabilities may go undetected.
Even without CT, the organization of information security at most enterprises already today assumes the existence of several technological locations deployed in clouds with various information security tools, with lebanon whatsapp data own internal services. The CT strategy can lead to additional complication of the IT environment, an increase in the number of clouds involved, the use of IoT devices, many of which were developed without taking security into account. For this reason, respondents recognize the lack of full visibility of events in the computing infrastructure by security professionals as a major problem (70%).
On average, companies surveyed had experienced 20 breaches in their defenses over the past two years. Four of those breaches involved ransomware used in DDoS attacks and resulted in disruptions, data loss, or regulatory violations.
Automation of information security processes. As the study showed, in a typical modern company more than half of the information security processes remain non-automated, while no single approach to their automation was identified.
concerns among the professionals surveyed are hard-to-block polymorphic cyberattacks and the documented rise in the use of DevOps methodology, which, while accelerating the pace of company development, also increases the risk that vulnerabilities may go undetected.
Even without CT, the organization of information security at most enterprises already today assumes the existence of several technological locations deployed in clouds with various information security tools, with lebanon whatsapp data own internal services. The CT strategy can lead to additional complication of the IT environment, an increase in the number of clouds involved, the use of IoT devices, many of which were developed without taking security into account. For this reason, respondents recognize the lack of full visibility of events in the computing infrastructure by security professionals as a major problem (70%).
On average, companies surveyed had experienced 20 breaches in their defenses over the past two years. Four of those breaches involved ransomware used in DDoS attacks and resulted in disruptions, data loss, or regulatory violations.
Automation of information security processes. As the study showed, in a typical modern company more than half of the information security processes remain non-automated, while no single approach to their automation was identified.