A new survey of security professionals by (ISC)2, found that 81% of polled cyber security professionals found their roles have changed during this COVID-19 pandemic. The results of this survey were discussed in a recent InfoSecurity article.
Along with their roles changing, 96% of respondents indicated their company’s work locations were shutdown and/or employees were working from home.
Probably most significantly though, the survey found that due to the increase in remote workers, 47% security professionals found their roles moved from security to helping with other IT related tasks like equipping the mobile workforce. This occurred even though many of these same organizations saw an increase in cybersecurity incidents.
The survey also asked respondents to share the challenges they were facing during the pandemic. These challenges included the lack of hardware to support the increase in remote workers, the opposing needs for quick deployment of remote technology while providing a level of security to protect systems, and helping end users come up to speed on security policies for working remotely.
One respondent commented: “Security at this point is a best effort scenario. Speed has become the primary decision-making factor. This has led to more than a few conversations about how doing it insecurely will result in a worse situation than not doing it at all.”
With the increase in threats and attacks from cyber criminals, and the increased use of corporate applications from the internet, the focus point for security around the application itself seems to have been left behind. Perhaps your organization has had to move your application to the cloud or make it more accessible to remote workers, making it more accessible to attacks as well. Now is the time to think about increasing security around the application itself.
K2’s runtime deterministic application security platform monitors the application and has a deep understanding of the application’s control flows, DNA and execution. By validating the application’s control flows, deterministic security is based on the application itself, rather than relying on past attacks to determine a zero day attack. Deterministic security results in the detection of sophisticated zero day attacks..
K2’s Next Generation Application Workload Protection Platform addresses today’s need for runtime security in an easy to use, easy to deploy solution. K2’s unique deterministic security detects new attacks without the need to rely on past attack knowledge, is lightweight, and adds under a millisecond of latency to the running application. To aid in quick remediation of vulnerabilities, K2 also provides detailed attack telemetry including the code module and line number being in the code being attacked, while at the same time integrating with leading firewalls to do real time attacker blocking.
Change how you protect your applications.
Find out more about K2 today by requesting a demo, or get your free trial.