Three Key Takeaways in the Era of the Zettabyte (How Much Data Is That Exactly?)

The Era of the Zettabyte

Sounds so ominous, the era of the zettabyte… I mean how big is a zettabyte anyways? A zettabyte is approximately equal to a thousand exabytes, or a billion terabytes and if you consider a large physical library holds the equivalent of 2 terabytes of data, you can start to see how enormous a zettabyte of data is. It’s actually pretty incredible to think that by 2025 there will be over 100 zettabytes of data stored in the cloud. (mind blown)

Modern society continues to create and store more and more data in the cloud, leading to an uncontrolled expansion of the data attack surface. With the way the cloud has removed the traditional perimeter and created a new data attack surface, the job of securing this data becomes increasingly challenging, if not next to impossible, with legacy data security or manual methods. Security teams don’t have a big picture view of the data that exists in various cloud services, which continues to grow exponentially every second of every day.

The Era of a Cloud-Native, Data-Centric Security Model

You want to leap forward into the future? It means using modern, cloud-native approaches for data security. Legacy data security suites aren’t going to cut it because they just don’t give visibility into what sensitive and regulated data you have in the public cloud. Yikes!

As the year is quickly coming to an end and another year is almost upon us, and as data continues to proliferate exponentially in the cloud, isn’t it high time we learn how to protect our data in the cloud? 

Seeing as we just had a webinar about learning how to protect your data attack surface, I thought it would be fun to share some takeaways. Check out our 3 key takeaways from our latest webinar, “Cloud Data Security 101: Learn how to Protect Your Data in the Cloud”. 

1. Data Democratization and Risk

Data is the new fuel or, as we like to call it, the new uranium  – because it is a critical element of growth. We all understand how important it is for innovation, and data democratization enables everyone in an organization to work with data to make it more accessible to do more analytics as quickly as possible. 

It increases agility, promotes innovation, and speeds up delivery of products to market..but it also contributes to the rapid growth of the “data attack surface.”  Developers can spin up or copy entire datastores in minutes, without ever involving security, adding immense amounts of complexity and risk.  

2. Shadow Data Remediation and Reduction

Shadow data. Everyone has it. That data security is unaware of that is hanging out creating risk, entirely unbeknownst to them. At Laminar we’ve also discovered shadow data in 100% of our customers’ object storage services.

So we all have Shadow Data, now what? This is where a Data Security Posture Management (DSPM) solution comes into play. (DSPM is an emerging security trend named by Gartner in its 2022 Hype Cycle for Data Security.) This category has emerged out of a direct need to discover, classify, prioritize, monitor, and protect sensitive data in the cloud without the limitations of existing approaches. Attacking the problem first by identifying all data, known and shadow, an organization has in the cloud. 

3. Solutions to Address the Sprawl of Data We All Face: The Ominous “Data Attack Surface”

DSMP solutions, enter stage left. DSPM solutions reduce the data attack surface by discovering all of your cloud data, classifying it by sensitivity, and then providing plans to remediate or mitigate data exposure. It is an approach to cloud data security that focuses on finding and securing sensitive data rather than cloud infrastructure security like CSPMs or CNAPPs. 

The data attack surface is a huge attack vector when it comes to the cloud. Reducing the data attack surface by focusing on the data first will allow for your company’s valuable data to be kept safe. 

Ready to learn more?

Interested in learning more about how you can protect your data in the cloud by learning in depth about new and evolving security risks associated with cloud data? Then check out our latest webinar or read our ebook for the Top 3 Reasons Cloud Data Security Belongs in 2023 Security Budgets!

A Call for Higher Education: Where Is Cloud Data Security Headed?

Anyone know when cybersecurity was born or when the first cyber attack was? I didn’t, and needed to look it up. What I found was pretty interesting and I thought you might be interested too!

The birth of cybersecurity

According to many sources, cybersecurity was born in the 1970s with The Advanced Research Projects Agency Network (ARPANET) and a program called Creeper, created by researcher Bob Thomas. In turn, Ray Tomlinson developed a program called Reaper to chase and delete Creeper. Reaper is credited as being an example of the first antivirus program.

The first cyber attack

According to some sources, the first cyber attack happened in 1988 at the hands of Robert Tappan Morris. Robert was a 20-something graduate student at Cornell who wanted to know how big the internet was (how many devices were connected to it). He wrote a program that traveled from computer to computer and asked each machine to send a signal back to a control server, which kept count.

So what’s my point? What does this all mean?

My point is, if we were to accept the field of cybersecurity as having started in the 1970s and the first cyber attack to have happened in 1988, you could say that these two concepts are relatively new. One might even say that cybersecurity is in its “infancy” given that it’s only been around for the last portion of a century, which is not all that long in the history of humans and their ancestors who have existed for over 6 million years!

We are just at the tip of the iceberg folks.

Given how new and, let’s admit it, how fast-paced cybersecurity is, education becomes paramount. Every year we learn new ways to protect from attacks, and attackers learn new ways to get around those defenses.

Today’s cybersecurity is radically different than it was in the late 1980s, especially with the arrival of the cloud. As cloud computing grows, so does the amount of data that proliferates in that cloud. That global data creation was forecast to reach 64.2 zettabytes back in 2020, and projected to grow to more than 180 zettabytes by 2025. Just mind-blowing, right?

In this modern world, cyber attacks have become more sophisticated, targeted, widespread, and sometimes even undetected. And with the amount of data exploding in the cloud, that data is easily exploitable and readily available in massive data centers Morris could have only dreamt about! Protecting that data in the cloud needs to be a top priority for cybersecurity professionals by continually learning about new technologies, like AI and quantum computing, alongside the tactics, techniques, and procedures (TTPs) used by attackers to get that data.

As data proliferates, it’s critical to ensure awareness of the risks you might be exposed to, such as data security policy violations or shadow data lurking in your S3 buckets.

We’re excited about cybersecurity education and the upcoming (ISC)2 Security Congress conference, and wanted to share some insights to what you can expect.

So the question is, what type of cybersecurity education is right for you?

Check out these sessions we’ve identified that we feel could help you understand the current state of cloud data security. I mean, I don’t see why not…

Cloud Data Risk is Lurking in the Shadows

Monday, October 11, 2022 |  4:00 PM –5:00 PM

Speaker: Andy Smith, CMO at Laminar

Shadow data is the new shadow IT and it’s leaving undue risk and breaches in its wake. CISO anxiety comes from the fear of the unknown and data security teams have lost visibility to where their sensitive data is in the cloud. Find out more here.

All About That Data: How Data Security and Management Will Rule The World

Monday, October 10 |  4:00 PM – 5:00 PM

Speaker: Andrew Neal, MSc, CCFP, C|CISO,CISM,CRISC, VP Research at Gartner

This presentation will examine the forces shaping the data challenges of today and tomorrow, and how IT security professionals can help guide the outcome. From data governance to data security, we will identify and discuss the key aspects of a comprehensive data strategy. Find out more.

How to Proof of Concept (PoC) Cybersecurity Tools

Monday, October 10 | 10:00 AM – 10:55 AM

Speaker: Alex Haynes, CISSP, CISO at IBS Software

This session will restore your confidence when faced with testing and acquiring cybersecurity tools by covering a step-by-step framework focused around the requirements for your business. We will cover some common cybersecurity toolsets and how to test and score them, and even how to test new technologies that defy categorization. Examples, checklists, and case studies will be shared. Learn more now.

Let’s all hop on the train and do some learning together! I hope to see you in Vegas next month! Viva la Vegas!

Meet Us Here

(ISC)2 Security Congress

October 10-11, 2022

Caesars Palace, Las Vegas, NV

Booth #201

Save Your Spot Now!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. And definitely don’t forget to @mention Laminar and @(ISC)², using the #ISC2 and #ISC2Congress hashtags when spreading the word!

What’s that you say? Overheard in the halls…of cyber conferences.

Events are back, big time, including the last event I attended, Black Hat USA in Las Vegas. Which was an absolutely packed house! COVID schmovid! – Don’t stop, won’t stop…attendees from cramming into the Mandalay Bay Hotel and Convention Center. All of us were chomping at the bit to get back out there to talk in person, learn new skills and network with thousands of other InfoSec professionals and evaluate an awe-inspiring (and yes, somewhat overwhelming) amount of security products and solutions.

I should mention that I’ve been to hundreds of events over my 10+ years as a field marketing professional, and at this point I feel like I’ve seen and heard it all. That’s why I thought it would be fun to share some of my observations in a more lighthearted manner. If you are up for some chuckles and learnings, check out my highlights reel of statements “overheard in the halls of cyber conferences,” backed up with results from a 2022 Security Professionals Insight Survey Laminar conducted of over 400+ cybersecurity professionals at Black Hat USA and AWS re:Inforce.

“The vendors with simple, clear, and focused offerings are the ones that stick to my mind. So many companies are trying to do 30 different things.”

That’s right folks, stick to what you know and do it well.

Focus. Simplify. Streamline.

The race to the cloud has created a domino effect for data proliferating within that cloud, security teams haven’t been able to keep up with the pace. AND, before you even know it, with the subscription to a few cloud services and the click of a few buttons, security has become a mere afterthought. Public cloud data security adoption is severely lagging public cloud usage, creating gaps for attackers to sneak in an exploit.

So here is some focus, simplicity, and clarity for you. It’s time to secure your cloud data. Fortunately, focusing on the best ways to help our customers secure their cloud data is all we do at Laminar. We don’t do anything else, so we can do it

really, really well. And when two-thirds of security professionals have data in the public cloud, that’s a focus that’s sorely needed.

2022 Security Professionals Insight Survey Response: Nearly two-thirds (65.1%) of respondents said they currently have data resident in the public cloud (Amazon Web Services, Microsoft Azure, or Google Cloud Platform). With public cloud adoption having a compound annual growth rate (CAGR) of nearly 26%, it’s surprising that respondents haven’t yet hardened data security for these assets. Less than half (40.3%) said that they had a public cloud data security tool in place to monitor for insider and outsider threats and data exfiltration.

  • Over one-third of organizations are not sure if an internal employee accidentally accessed sensitive data in the public cloud in the past months
  • Over a third are not sure if they have had a data exfiltration

“Black Hat is BACK” + “It’s so nice to see users walking around, not just industry professionals.”

The pandemic sure did a number on Black Hat attendance and how the event was executed over the past two years. 2020 was 100% virtual and 2021 was dismally attended with a large virtual component. It’s safe to say that this year was an immense success, both in person and virtually…so ya…Black Hat is BACK and people were there to network and learn!

The pandemic has shifted how people work. Far more of us are choosing to work remotely part of, if not all of the time. Just like how a lot of conferences now take a “hybrid” approach to their event that gives attendees the option to come in person or remotely, this shift has also required organizations to support a hybrid work model. This new approach to work demands a different approach to cloud data security because it has accelerated public cloud adoption, removed the perimeter, and created huge blindspots for security teams.

2022 Security Professionals Insight Survey Response: Nearly two-thirds (62.3%) of respondents said their organizations have a hybrid work model, while another quarter (25.9%) are fully remote. As a result, data is outside the control of the traditional on-premises security perimeter and must be secured and monitored with new, cloud-native solutions.

“With all the hackers about, it might be safer to text going forward.”

This statement shows how little most people know about how hacking actually works. And yes, I did actually hear this at a security conference. But my point is: for anyone who doesn’t know how hacking works, how on earth would they be expected to know that they need a cloud data security tool to monitor and mitigate the insider threats to their data? Many people focus on the “boogeyman” threats to their data without understanding that cybersecurity is a lot more basic, and boils down to one basic theme: visibility.

According to Gartner, through 2023, 75% of cloud security failures will result from inadequate management of identities, access and privileges. That’s sobering news given that securing one’s cloud falls to the customer, not the cloud provider.

2022 Security Professionals Insight Survey Response: 59.6% of security respondents simply do not have a public cloud security tool to monitor inside threats or are unsure if they do.

As you absorb these thoughts, ask yourself what you are going to do to protect your organization from the insider and external threats lurking in your public cloud. How will you discover, prioritize, secure, and monitor data used and stored across multi-cloud environments? It’s time to get ahead of the game to protect the attack surface so that your organization can boost efficiency, collaboration, and reduce costs to stay competitive in this roller coaster of a market.

Stay awesome.

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. And definitely, don’t forget to @mention us when spreading the word!

Street cred to the following for helping me with this blog: Philip Gavlan (CDG), Fitz Barth (Laminar).

Cloud Transformation & Data Democratization: Rising Above the Waves When Megatrends Collide

Ever wonder what happens in an age of disruption when you mix a global pandemic with megatrends?

A significant rise in the number of disruptive and sophisticated attacks, that’s what! (Note to self, many of these attacks could have been avoided with the appropriate security embedded throughout the business.) Still work to be done…sigh.

The global pandemic has created a perfect storm of conditions for threats to data in the cloud. This new wave of threats, compounded by the accelerated rate of the megatrends of cloud transformation and data democratization, is giving rise to a whole new set of risks which has also been dubbed the “Data Attack Surface,” or as I think about it,the “Bermuda Triangle.” These two megatrends are defining the course of progress for enterprises of all shapes, sizes, and industries. It’s abundantly clear that these trends have allowed enterprises to support more remote work, enhance customer experiences, and generate immense value. All a huge plus in my book!

Rising above the waves of a perfect storm.

The data attack surface is the biggest cloud security risk to your organization. As digitization accelerates, data, that small four letter word (seemingly so innocent) continues to grow exponentially. I mean, most of us have heard the stat from 2018 that 90% of the world’s data had been generated in the two years before that alone. Data growth hasn’t really slowed down since then. And, most of that data is getting dumped into the cloud (social media, communication, digital photos, services, IoT, etc). Combine that explosion in the volume of data with the increased potential for misuse by users given the lack of traditionally trained data gatekeepers, and the risk increases exponentially.

This massive increase in risk to data in the cloud means security teams are faced with a perfect storm at their doorstep in the amount of data to track and protect. To make things even more challenging—do you even know where that data resides? Or what type of data it is (e.g., crown jewels)? Who is responsible for it? Who has access to it? What is its security posture? Like security teams don’t have enough to worry about already.

That’s a lot of questions to answer in regards to visibility and security of the data attack surface, which is now the most challenging aspect of cloud security.

Three years into the pandemic, and well into our megatrends, I believe we are now in the eye of the storm. Which means that now is the time for security to act swiftly and quickly without delay to contend with the complex issues of data in the cloud and sophisticated attackers. Time is of the essence. Act now before the calm has passed.

I mean, do you really want to find out the hard way?

Didn’t think so…Time to seize the day and surf the waves of this perfect storm by creating a framework for discovering, prioritizing, securing, and monitoring your cloud data. Surf’s up!

If you are interested in learning more about cloud data security solutions that can help you ride the waves of this storm, Laminar can help. You can either schedule a demo with us or find us in person at InfoSec World, September 26-27.

Now in its 28th year, the 2022 edition of Infosec World features seven diverse tracks:

  1. Hackers & Threats
  2. Leadership & Budgeting
  3. Cloud Security
  4. Security Awareness
  5. Risk Mitigation
  6. Critical Infrastructure
  7. Identity

Over 1,500 security professionals from across industry and government are expected to attend, along with keynote speakers Robert Herjavec (CISO of the Herjavec Group), Tomas Maldonado (CISO of the NFL), and Ron Ross (Cyber Fellow at NIST).

Additional pre- and post-conference workshops and summits include topics on ransomware, threat testing, supply chain, cryptocurrency, cloud security, leadership, and zero trust.

Stop By and Watch Our Live Session

Session: Data Risk is Lurking in the Shadows

When: Mon, Sep 26 at 4:00PM–4:25PM

Shadow data is the new shadow IT and it’s leaving undue risk and breaches in its wake. CISO anxiety comes from the fear of the unknown and data security teams have lost visibility into where their sensitive data is in the cloud.

Learning objectives for this session:

  • What is shadow data?
  • How does it occur?
  • Where is your shadow data?
  • How to shine a light on the shadows

Meet Us Here

InfoSec World 2022
September 26-27
Disney’s Coronado Springs Resort
Booth #701
Save Your Spot Today!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. And definitely, don’t forget to @mention us and @InfoSec_World, using the #InfoSecWorld hashtag when spreading the word!

Data is the new uranium and data security is vital to protect this new currency.

Data is the new uranium.

I just love a good analogy, don’t you? Let’s explore an analogy I keep hearing over and over again where data is likened to uranium.

As you may already know, data has become one of the world’s most valuable resources and is the new currency of the world. Some claim it’s as valuable as oil. Some suggest that it’s even more valuable than oil and comparable in value to uranium. That’s right, data is the new currency and a good approach to data protection is to think about data as if it is as valuable as uranium. Full stop. Let’s dig into this…and discover why this analogy works so well.

Uranium and data are very dangerous if misused.

Uranium is radioactive, making it hazardous because of its instability and very dangerous if misused. Data can also be misused in many ways, such as by attackers in a wide scale data breach of government or corporate data which could lead to blackmail, reputational damage, financial or other issues to the individuals whose data may have been compromised. The very personal nature of the data that organizations track about their users means that it can be weaponized against the users and against the organizations collecting and using that data. Just look at Facebook, Twitter, Amazon, Google, Uber, Morgan Stanley]—all have very famous examples of data misuse in the real world.

Uranium and data both have actual monetary value

Units of physical uranium are publicly listed on the market and can be bought and sold just like stocks. Data too, can be monetized, as demonstrated by the world’s five most valuable companies dealing in it. Having the right data can lead to ad revenues, product innovation, and just general market domination. Having lots of the right data can make you extremely rich (Apple, Microsoft, Google, Amazon, and Facebook).

Uranium and personal information are powerful sources of “fuel”.

Uranium is widely used to fuel nuclear energy plants. Data is used to fuel AI adoption and digital transformation. Organizations that harness it well enable their people, their decisions, experiences, technologies, and so on. For the end user like myself, it drives our behavior through the innovations we can experience. It’s used to unlock your iPhone, it drives better customer experiences, it is THE fuel for digital transformation!

Uranium and data must both be controlled and disposed of properly

There are numerous rules around data and uranium, and when they are not being used, they need to be protected and disposed of. Just as one would not use radioactive uranium for unrelated items (i.e., a paperweight), data should not be used outside of its intended purpose. The same goes for disposal: there are very specific ways to dispose of uranium, and increasingly strict laws around the world ensuring that data, too, must be disposed of properly, so it can not be found and reused (or abused) in the future.

Ok, I think you get it now, so what does all this mean?

It’s time to take a closer look at how we secure data and treat it with the value and danger that it can hold. Think about it, you wouldn’t have a haphazard approach to how you keep your uranium secure, would you?The same more strict approach should go for handling data. Digital transformation is an unstoppable force that continues to accelerate and gain momentum…making the fuel that is data directly accessible to just about anyone and everyone who needs it within the organizations that deal in it in today’s world. There are no more “walls” to close off the perimeter, when you move to the cloud everything is an API-first approach. That means that we need a data-centric approach to our security that takes additional steps to ensure the data is safe from improper or harmful use.

Proper permissions are imperative for data, along with full observability in real time, in order to remediate or secure it. 

Educating, training, and proper permissions for security and governance teams to understand and secure cloud data should be top of mind, which will significantly reduce the risk of being compromised. The pace of change alone is so rapid that the data in the cloud is largely invisible to these teams, and cloud data that is unknown and invisible means it is often unprotected, exposed, and vulnerable to both external and internal threats.

Stay in the offense, don’t allow your cloud data to be unprotected, exposed, and vulnerable to breaches. It’s high time you future-proof operations to reach your transformation goals. It’s time to take steps to better understand what data you have, and where it resides. What are you waiting for?

Data is valuable beyond measure, like uranium. 

To sum it all up, I must say one more time—uranium, like data, is extremely valuable and should be treated as such—as one of the world’s most valuable (and vulnerable) resources. This means protecting “your crown jewels,” your most important data, from internal or external corruption and illegal access needs always be top of mind.

Interested in learning more? Check out our next webinar and sharpen your cloud data security knowledge skills!

Meet us here

Data-Centric Security Trends: Secure Your Cloud Data Now
Watch On-Demand Webinar

Save your spot!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. Don’t forget to @mention us when spreading the word!

Can You See Me Now? Time to Shine a Light on the Huge Cloud Security Risk Posed by Your Shadow Data.

Shadow data is the largest threat to your data security that you don’t even know about. There is nothing that is growing faster in the cloud than data.

It only takes one developer to leave an S3 bucket with user data open or leave a redundant copy of data out there after a cloud migration. The result is shadow data that’s just lying around, worst of all, it doesn’t even take an elite hacker to find it. There are automated scans running everywhere on the internet that are constantly looking for weaknesses or opportunities to find this “shadow data.”

According to Flexera 2021 State of the Cloud Report, 92% of enterprises today have a multi-cloud strategy—82% of which have embraced a hybrid approach. Which leaves an open invitation for shadow data to accumulate because of how difficult these environments are to monitor effectively. There are many risks to not having visibility over all of your cloud data, especially shadow data, here are a few: (1) you don’t know what or where sensitive data is located in your cloud environments, (2) the HUGE reputational damage you may face resulting from an unsophisticated attack, perhaps from an attacker that is just looking to make headlines to increase their reputation at your expense, (3) the millions you spent on your security program could be a waste because data was left out there without proper security controls, as someone made a misconfiguration error, and (4) those dreaded, four-letter words (acronyms) GDPR, CCPA, CPRA…a.k.a., the regulatory liability of your data being discovered.


Got your attention now?

The first step to combatting this pesky thing called “shadow data” and significantly reducing your organization’s security risk starts with acknowledging and understanding this shadow data. Unmanaged data stores and shadow data are a natural byproduct of the race to the cloud. But with proactive planning there are ways to ensure visibility and protection of this data in all the places it may be hiding.

However, not all solutions for combatting shadow data are created the same. In your evaluation of cloud data monitoring solutions, top of mind should be looking for solutions which discover and classify all data, including shadow data, continuously for complete visibility. It’s also important to find a solution that will secure and control data to detect leaks and remediate without interrupting data flow, automatically improving your risk posture. Be sure to look into platforms that can scan your entire cloud account and automatically detect all data stores and assets, not just the known ones. This data observability allows a deeper understanding into where your shadow data stores are and who owns them, leading to a secure environment and the ability to thrive in a fast paced, cloud-first world.

Headed to Black Hat USA?

If you are interested in a deeper and more holistic understanding of cloud data security, we have three top briefing session picks at Black Hat USA, compliments of our head of solution engineering, Jon Tobin. Check them out!

Backdooring and Hijacking Azure AD Accounts by Abusing External Identities

Speaker: Dirk-jan Mollema, Security Researcher at Outsider Security

Tracks: Cloud & Platform Security, Enterprise Security

This briefing session is relevant to cloud security and in particular it will give insights into cloud access/permissions that allow attacks to exist in Azure AD. The session will also provide solutions to harden against these attacks and detect abuse of the technicalities that eventually lead to the abuse. Find out more here.

IAM The One Who Knocks


  • Igal Gofman, Head of Security Research at Ermetic
  • Noam Dahan, Research Lead at Ermetic

Tracks:  Enterprise Security, Cloud & Platform Security

An interesting session about managing identities and access to multi-cloud environments to reduce the attack surface in enterprise cloud environments. Promising to supply actional steps “anyone can follow”, along with a comparison of the three primary cloud services: AWS, Azure, and GCP. Be sure to check it out, you can find more information on the briefing session here.

Better Privacy Through Offense: How To Build a Privacy Red Team

Speaker: Scott Tenaglia, Engineering Manager at Privacy Red Team, Meta

Tracks: Privacy, Lessons Learned

Privacy is an important component of a holistic cyber security program because they test how well the program stands up to threats from real adversaries. If you are looking for a deep dive into privacy, this is a great briefing session to check out to learn: what a privacy red team is, the challenges they face, and examples of real world operations performed by the Meta privacy team. Learn more about this session here.

Meet us here

The Laminar Security team is going to be at Black Hat in full force, and we’d love to meet you to learn about your cloud data security challenges, including shadow data, and how we can partner with you to solve them. Stop by to find out why Laminar is providing cloud data security at the speed of cloud.

Laminar Booth #2500
August 10-11
Mandalay Bay, Las Vegas, NV

Book an Executive Briefing today!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. Don’t forget to @mention us and #blackhat or #blackhat22 when spreading the word!

Four Steps to Reinforce Your Cloud Data Security

In today’s world of organizations racing to cloud the dynamic nature of those environments and the sprawl of techt, there is an urgent trend that has surfaced…we need to have stronger and more automated security in cloud-based environments to keep that data safe.

There is enterprise data security on-premises and cloud security for infrastructure, but nothing that secures data for everything you build and run in the cloud. Developers and data scientists are freely and rapidly capturing, copying, and manipulating sensitive data in public cloud environments, which has resulted in security and data teams losing visibility and control over data in the cloud.

Where do we turn to find solutions to help? Thankfully live events are back, as they have been sorely missed, and AWS re:Inforce is right around the corner. This AWS event is a perfect melting pot for learning and networking, and is focused for professionals interested in cloud security, compliance, identity, or privacy. Amazing – an event where you can learn how to reinforce your cloud data security!

Whether or not you are headed to AWS re:Inforce…don’t you want to learn about four surefire ways to reinforce your cloud data security? I mean, then at least you can tune in at the event to learn more about where it’s coming from.

Embed Data Security Into Your Cloud Architecture

With organizations in a race to the cloud to maintain their competitive advantage, challenges in cloud-native and multi-cloud environments are popping up just as fast. By building data security into your cloud architecture you can easily optimize for security. Data will stay safe in your cloud with only metadata sent out.

Discover and Secure Shadow Data

Increasing democratization of data in the cloud is creating one of the largest risk areas, and “Shadow Data” (abandoned, orphaned, and otherwise lost data stored in the cloud) is a primetime example. Discovering and securing this shadow data autonomously is going to give you the advantage you need to gain complete observability so that you can remediate and secure your data across clouds.

Enforce Your Sensitive Data Security Posture

Data Governance teams, tired of chasing people to find out what’s going on? With automated verification of data security posture and guided remediation you can overcome your data governance challenges for everything you build and run in the cloud.

Efficiently Ensure Compliance

Ensuring compliance efficiently can be done by leveraging automated discovery and control. Data Security Posture Management (DSPM) that enforces best data security practices and data policy, guides remediation, and reduces data attack surfaces is definitely the way to go.

In closing, the Laminar team is headed to AWS re:Inforce to learn, network, and meet with folks like you. If you are interested in learning more about how you can improve your cloud data security posture, then book your executive briefing today.

Meet us here

Laminar Exec Briefing Suite
Tue, July 26–Wed, July 27
Boston Convention and Exhibition Center
415 Summer St., Boston, MA 02210 (map)
Save your spot today!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. Don’t forget to @mention us and #AWSSecurityInfo or #reinforce when spreading the word!

Three Key Cloud Security Trends to Shape Your RSAC 2022 Experience

Headed to RSA Conference 2022?

RSAC is almost here again and it’s where anyone who is anyone will be there networking, learning, and exploring the latest trends and technologies in security. This is your golden ticket to capitalizing on the opportunity to gain a better understanding of the new and innovative cyber technologies and solutions that are out there from some of the best and brightest in the industry.

This year we thought we would identify three top trends that your organization should look out for at RSAC. Which is kind of perfect for this year’s theme of “Transform” because we are at a time in history where a major transformation is occurring due to the pandemic, including an accelerated trend of organizations shifting to the cloud, almost by double. The question is no longer if but instead when for organizations that have not yet begun their cloud journey.

Continue reading to hear what top three trends you should pay attention to when at RSAC!

Digital transformation – the business of going to the cloud

The era of digital transformation is upon us and now is the time where organizations must be innovative and fluid to stay ahead of the competition. In an effort to remain competitive in this rapidly changing environment, organizations need to stay on top of the latest trends in digital transformation by adapting and embracing new technologies, strategies and change. “More than half of Enterprise IT spending in key market segments will shift to the Cloud by 2025”, according to Gartner.

Data democratization and the need for cloud data security

Data democratization is a game changer. It’s allowing organizations to enable and empower the average end user in their workforce to gather and analyze data without requiring outside help. Which means that there are no gatekeepers to create bottlenecks at the gateway of the data. The result of data democratization is making better data-informed decisions and better customer experiences powered by data. Sounds great right? Well, due to a rapid and dynamic release cycle, there is going to be less time to consider, audit, or remediate gaps in data security. The downside risk means that data is seldom deleted or removed, leaving shadow data in its wake which means securing that data is next to impossible. Be sure to tune in and listen for conversations and sessions around this topic.

The future of cloud data security – Cloud Native Tools and Platforms

The mass shift to the cloud has given way to cloud-native applications becoming more prevalent since they are quite literally designed specifically to work on the cloud. These cloud-native applications seek to take advantage of the speed and efficiency of the cloud platform. This brings way to those legacy security tools designed to protect the on-premise applications rearing its ugly head. These legacy tools aren’t going to be enough to protect cloud-based resources, leaving these applications exposed to threats and open to attackers

Cloud security budgets are increasing, with 59% of the surveyed organizations expecting to increase cloud security spending next year. On average, 27% of security budgets are devoted exclusively to cloud security. Time to find out the best ways to protect

Data security at the speed of cloud — accelerate your future.

Interested in continuing the conversation to discuss cloud data security and how you can discover, prioritize, secure and monitor your cloud data? You’re in luck, we are hosting executive briefings during RSA Conference and would love to meet you there. Space is limited, so book your spot today.

Meet us here

Laminar Exec Briefing Suite

Mon June 6, 9:00 am – Tue, Jun 9, 1:00 PM

649 Mission St #500, San Francisco, CA, 94105 (map)

Save Your Spot Today!

If you liked what you saw here, then be sure to share with your co-workers and friends because we want to hear from you! Follow us on Twitter @laminarsec or find us on LinkedIn. Don’t forget to @mention us and #RSCA or #RSAC22 when spreading the word!