Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >The Future of Cybersecurity is in the Cloud
    Technology

    The Future of Cybersecurity Is in the Cloud

    Published by Gbaf News

    Posted on April 29, 2018

    9 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    This image depicts trends in global equity fund inflows for the second consecutive week, highlighting investor behavior in response to U.S. interest rates and commodity prices. Relevant to the article on market dynamics in banking and finance.
    Graph illustrating inflows into global equity funds amidst U.S. market changes - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Written by Eric O’Neill, National Security Strategist at Carbon Black

    For decades we have feared the cloud.  During my time working counterintelligence for the FBI, we feared the Internet so much that agency computers functioned solely on an isolated intranet connected via hard cables.

    It’s no wonder to me that that government has still not embraced the unlimited processing power cloud computing affords.  But despite the fact that utilisation of the cloud has become ubiquitous – we store our photos and memories, email accounts, business files and our very identities there – many companies fear the cloud: how can I control and secure my information if I give it to someone else?

    This concern has made cloud computing one of the more polarising issues for IT professionals.  Many opponents of the cloud point to the fact that not all cloud services are equal in their dedication to security:

    • Poor configuration of the cloud can lead to circumvention of internal policies that classify sensitive data and protect access to it.
    • Not all cloud services offer strong authentication, encryption (both in transit and at rest) and audit logging.
    • Failure to isolate a user’s data from other tenants in a cloud environment together with privacy controls that are not robust enough to control access
    • Failure to maintain and patch to ensure that known flaws are not exploited in the cloud service.

    According to the 2017 Cost of Data Breach Study: Global Overview (Ponemon Institute, June 2017), the average total cost of a data breach is $3.62 million. The average cost for each lost or stolen record containing sensitive and confidential information is $141.  While these costs decreased overall from 2016 to 2017, the numbers remain astronomical, particularly to small businesses who may be unable to recover from data breach liability.  No industry is safe from cyberattacks and cyberattacks continue to grow, year after year.

    Cloud security must grow and evolve to face these threats and provide a bulwark of defence for the consumers that leverage the efficiencies and advantages cloud services provide.  In addition to offsetting the fear highlighted above through good security practices by the cloud security vendor, cloud services can take security one step further.  Cloud services can not only secure data within the cloud, but can leverage the transformative cloud industry to secure the endpoint users that use the service.

    Cloud Security is the future of cybersecurity.

    Cyberattacks like the WannaCry/NotPetya pandemic and the extraordinary growth of ransomware are often launched by sophisticated attackers – sometimes state sponsored – that bowl over traditional and legacy security.  The modern attackers are cyber spies that use traditional espionage tactics, together with innovative and disruptive malware to bypass passive, defence-based security measures.  To defeat such attacks, security must transform itself into an active profile that hunts today’s attacks as aggressively as it predicts the threats of tomorrow.

    To predict and defeat attacks in real time, cybersecurity must move to the cloud. The cloud can leverage big data and instant analytics over a large swath of end users to instantly address known threats and predict threats that seek to overwhelm security.

    Cloud security must create a collaborative approach that analyses event streams of normal and abnormal activity across all users to build a global threat monitoring system.  Because many different users leverage the same cloud environment, cloud security is particularly suited to building a collaborative environment that instantly predicts threats through a worldwide threat monitoring system and shares threats among all users under the cloud umbrella.

    Cyberattacks continue to disrupt our way of life with innovative new approaches to seeding malware and stealing our data.  Security must in turn actively work to disrupt the cyber spies, attackers and terrorists through a collaborative security approach that leverages the big data and analytics that thrive within the cloud.  We’ve come a long way from my days on the FBI Intranet.  It’s time to fully embrace the future of security.  That future is within the cloud.

    The good news is that the future of cloud security is now.   Predictive security in the cloud has innovated security in a manner that will frustrate cyber spies for years to come. This technology collects and analyses unfiltered endpoint data, using the power of the cloud, to make predictions about, and protect against future and as-yet unknown attacks.  This means predictive security in the cloud can identify attacks that other endpoint security products miss, and provides visibility into attacks that evolve over time.  In other words, it gives you the ability to hunt threats before the attacker begins to hunt you.

    This new approach to security will not just level the playing field between the attacker and security teams, it will shift the balance in the opposite direction and provide security with an advantage.  Cyberattacks rely on stealth and surprise to disrupt, destroy and steal – the tools of a spy. Predictive security in the cloud works like a counterintelligence agency that hunts the spies before they attack.  This innovative approach is the next generation of security.

    Written by Eric O’Neill, National Security Strategist at Carbon Black

    For decades we have feared the cloud.  During my time working counterintelligence for the FBI, we feared the Internet so much that agency computers functioned solely on an isolated intranet connected via hard cables.

    It’s no wonder to me that that government has still not embraced the unlimited processing power cloud computing affords.  But despite the fact that utilisation of the cloud has become ubiquitous – we store our photos and memories, email accounts, business files and our very identities there – many companies fear the cloud: how can I control and secure my information if I give it to someone else?

    This concern has made cloud computing one of the more polarising issues for IT professionals.  Many opponents of the cloud point to the fact that not all cloud services are equal in their dedication to security:

    • Poor configuration of the cloud can lead to circumvention of internal policies that classify sensitive data and protect access to it.
    • Not all cloud services offer strong authentication, encryption (both in transit and at rest) and audit logging.
    • Failure to isolate a user’s data from other tenants in a cloud environment together with privacy controls that are not robust enough to control access
    • Failure to maintain and patch to ensure that known flaws are not exploited in the cloud service.

    According to the 2017 Cost of Data Breach Study: Global Overview (Ponemon Institute, June 2017), the average total cost of a data breach is $3.62 million. The average cost for each lost or stolen record containing sensitive and confidential information is $141.  While these costs decreased overall from 2016 to 2017, the numbers remain astronomical, particularly to small businesses who may be unable to recover from data breach liability.  No industry is safe from cyberattacks and cyberattacks continue to grow, year after year.

    Cloud security must grow and evolve to face these threats and provide a bulwark of defence for the consumers that leverage the efficiencies and advantages cloud services provide.  In addition to offsetting the fear highlighted above through good security practices by the cloud security vendor, cloud services can take security one step further.  Cloud services can not only secure data within the cloud, but can leverage the transformative cloud industry to secure the endpoint users that use the service.

    Cloud Security is the future of cybersecurity.

    Cyberattacks like the WannaCry/NotPetya pandemic and the extraordinary growth of ransomware are often launched by sophisticated attackers – sometimes state sponsored – that bowl over traditional and legacy security.  The modern attackers are cyber spies that use traditional espionage tactics, together with innovative and disruptive malware to bypass passive, defence-based security measures.  To defeat such attacks, security must transform itself into an active profile that hunts today’s attacks as aggressively as it predicts the threats of tomorrow.

    To predict and defeat attacks in real time, cybersecurity must move to the cloud. The cloud can leverage big data and instant analytics over a large swath of end users to instantly address known threats and predict threats that seek to overwhelm security.

    Cloud security must create a collaborative approach that analyses event streams of normal and abnormal activity across all users to build a global threat monitoring system.  Because many different users leverage the same cloud environment, cloud security is particularly suited to building a collaborative environment that instantly predicts threats through a worldwide threat monitoring system and shares threats among all users under the cloud umbrella.

    Cyberattacks continue to disrupt our way of life with innovative new approaches to seeding malware and stealing our data.  Security must in turn actively work to disrupt the cyber spies, attackers and terrorists through a collaborative security approach that leverages the big data and analytics that thrive within the cloud.  We’ve come a long way from my days on the FBI Intranet.  It’s time to fully embrace the future of security.  That future is within the cloud.

    The good news is that the future of cloud security is now.   Predictive security in the cloud has innovated security in a manner that will frustrate cyber spies for years to come. This technology collects and analyses unfiltered endpoint data, using the power of the cloud, to make predictions about, and protect against future and as-yet unknown attacks.  This means predictive security in the cloud can identify attacks that other endpoint security products miss, and provides visibility into attacks that evolve over time.  In other words, it gives you the ability to hunt threats before the attacker begins to hunt you.

    This new approach to security will not just level the playing field between the attacker and security teams, it will shift the balance in the opposite direction and provide security with an advantage.  Cyberattacks rely on stealth and surprise to disrupt, destroy and steal – the tools of a spy. Predictive security in the cloud works like a counterintelligence agency that hunts the spies before they attack.  This innovative approach is the next generation of security.

    More from Technology

    Explore more articles in the Technology category

    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    Image for Nominations Open for Brand of the Year Technology 2026
    Nominations Open for Brand of the Year Technology 2026
    View All Technology Posts
    Previous Technology PostThe Cyber Intelligence Landscape Is Evolving
    Next Technology PostChange Blindness: Mobile Phone Users Miss Vital Information