The past year can be summarized as the year that saw an overnight safe to remote, working and rapid uptake of cloud technology. A major fallback of its shift was that critical security practices were sacrificed. It caused less technological visibility, lack of control and therefore create a larger, more valid attack surface for self advertising to target. According to the security report, in the last one year, more than four in five organization suffered at least one security incident, business, email compromised and data breaches being the most common issue. As a result, organizations especially mid size businesses have faced the brand with decreased agility, as well as faced challenges in their digital adoption journey. We are nearly in the mid 2021, where we are dealing with the security challenges, broadly categorized under three pillars. Number one consistency, number two cost and number three complexity: security experts globally have cited, maintaining consistency of the policies and their enforcement across the data centers and cloud as very critical. They have also highlighted the cost and complexity of using multiple security controls, leveraging new software development model and unsafe public cloud uses as the data in next great security challenges. However, with the challenges of the data age, we have devoted into a new age of iit security. In this scenario, organization need to be prepared with best practices that will help them set aside from their competition bus, but also provide a more secure infrastructure to their critical data. The organization can battle against the security challenges and thrive in these tough times.

The following steps should be taken, for example, need for transparency across environment need to stay prepared, and the security teams should be able to prevent cyber attacks on cloud based application and data. Hybrid visibility is the key, as it is extremely difficult to maintain the comprehensive security with one cloud service provider. A report suggests that the 75 of cloud infrastructure users are multi cloud today and 87 percent expect to use expect to use those multiple cloud service provider. Two years from now, which will help in establishing concrete cyber security measures, we are witnessing a similar trends in india. Also, the large enterprise customers are getting ready to embrace those cloud strategy and its getting embedded in their roadmap. Also, there have been a repeated incident of service outage in the large indian banks, causing stress to the customer experience operationally its becoming too complex, so the adoption of cloud is going to happen faster than we think the cloud complexity demand complexity and consistency. Both the public cloud uses has now become omnipresent, and security teams therefore need to establish the consistent control around the data and the visibility within the complex cloud infrastructure. It is important for organization to choose a cloud friendly route which is agnostic in terms of both architecture and cloud service provider organization in asia, pacific lagged on cloud native application architecture adoption because the tools they use dont support the cloud native application. However, they are likely to catch up, as it is expected that over half approximately 56 percent of business critical workloads in the asea pacific region will become cloud native 24 months from now aligning with the security implication of remote workspace providing comprehensive data security during a remote Working is very hard and security teams are looking to automate and provide the seamless and secure working processes.

The greater security collaboration during the initial rush to remote work has resulted in a stronger focus on process, automation and the use of security analytics, seeing the results, which include organizations combining security and non security data to better identify the cyber risk that could impact the businesses. The risk can be tracked to specific business processes preparing for the future, like solar, wind. Cyber attacks has resulted in far reaching those implementation and pointed out those serious loopholes in our security infrastructure. However, we need to ask what have companies done to avoid those another criterias? And surprisingly, it has found that less than half of the cisos have briefed their senior leadership or boards about the solar wind act and their own organizational positions. The time for organizations to adopt a data centric framework which will help them to look beyond the domains, enhance the collaboration across the specialization and avoid overlooking the whole criticality of the issues. It is high time that organizations start investing more in this area and come with a plan for the future going forward. Security priorities should be in broadly around conducting more security training investigating those for or deploying cloud based, security analytics and investing in tools to help automate and orchestrate the security processes. Additionally, it would be advisable to actively develop an integrated software architecture for security, analysts, analytics and operational tools. The biggest key takeaway from this state of security is that the security is a data problem organization need to understand that this data that needs protection, and it is the data that indicate the threat, point out that and the possible action to be taken for its prevention.