Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cyber Tactics ColumnCybersecurity News

Improving Network Security and Efficiency with the Cloud

By Steven Chabinsky
Steve Chabinksi
November 1, 2014

Cloud computing technology providers are rapidly improving the effectiveness and efficiency of network security, and what we are seeing is just the beginning. If your business is not already taking advantage of cloud-based security solutions, chances are high you will benefit from this emerging market soon.

Similar to the innovations and efficiencies we have seen on the operational side from cloud-only providers (think Amazon, Google, LinkedIn and Salesforce), the cloud security market has become best of breed for, among other things, securing email and protecting against malicious Web traffic; for managing user account provisioning, identification and accesses; for continuously monitoring threat activities and patching vulnerabilities across a geographically dispersed and mobile workforce; for aggregating and analyzing huge volumes of security-related data; and, ultimately, for detecting, containing and mitigating incidents.

Strong, Flexible and Absorbent: Perhaps the best example of the benefits of cloud-based security is DDoS (Distributed Denial of Service) protection. Cyber attackers are flooding their targets with bad traffic at current rates of 200-400 gigabits per second. Companies simply cannot protect themselves against these high-volume attacks. Those that lease lower Internet bandwidth service are easily taken offline by a sustained attack no matter what they do. Meanwhile, companies with higher bandwidth pipes may opt to deploy local inline hardware for protection, but they still commonly succumb to attacks between one and 40 gigabits per second. Not surprisingly then, in a recent survey of the eCommerce industry, enterprises that rank DDoS as a high business risk routinely rely on a handful of cloud technology companies that deftly couple proprietary automated tools, remote 24/7 teams of managed security experts and a carefully conceived elastic cloud infrastructure.

Big Data Analytics. There was a time when the National Institute of Standards and Technology (NIST) warned systems administrators that their computer security logs, although valuable for reducing risk, were so voluminous that “the staff time and resources needed to perform the analyses and to manage the log information have to be taken into consideration.” Enter the cloud. The sheer amount of storage, data feed intakes, number crunching and relational analyses that can be performed and readily shared using cloud infrastructure is staggering. There has been much talk over the years about the need to enhance “information sharing” between any number of groups of people in the private and public sectors. The cloud is moving the equation away from local human interactions to focus instead on machine acquisition, correlation, learning and sharing at network speed and globally. 

In today’s cloud environment, crowd-sourced cyber intelligence includes billions of records derived from multiple platforms of event logs, reputational data and malware analysis. Computers are particularly good at finding anomalous behavior. Malicious activities are the exception and not the rule, and catching new intrusions may require not only a computer’s discerning eye but also a computer’s instant ability to put that data into years of context across a wide range of data sets.  

Developing Self-Healing, Neural Networks. Another important advantage of cloud-based cybersecurity architectures is their ability to centrally manage a diverse set of endpoints. Cloud technologies can push real-time, simultaneous changes whether to the endpoints themselves or to the endpoints’ larger operating environment. This ability, combined with the big data analytics and machine learning, offers a glimpse into next-generation cloud-based cybersecurity. Bad guys already are finding it increasingly hard to hide their techniques and their human identities, while the good guys are using cloud platforms to detect both known and previously unknown malicious activities in nanoseconds, to share that information across millions of end users immediately, and to successfully respond to intrusions and attacks before they cause significant damage.  

To be sure, the Internet will never be crime-free. Still, there is reason to believe that evolving technologies will fill a historic void in our abilities for quick detection, attribution, assessment and response. If today’s growing cloud solutions are combined with equally effective policy choices on an international scale, we finally will have tipped the scales in favor of the defender.  

KEYWORDS: cloud computing cloud security cyber security awareness network security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chabinsky 2016 200px

Steven Chabinsky is global chair of the Data, Privacy, and Cyber Security practice at White & Case LLP, an international law firm. He previously served as a member of the President’s Commission on Enhancing National Cybersecurity, the General Counsel and Chief Risk Officer of CrowdStrike, and Deputy Assistant Director of the FBI Cyber Division. He can be reached at chabinsky@whitecase.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1218-Cyber-Feat-slide1_900px

    Who's Responsible for Cloud Security?

    See More
  • Cyber Tactics

    Looking for Clues: Improved Network Anomaly and Event Detection

    See More
  • Traveling with Technology Security Magazine November 2017

    Traveling with Technology: An Information Security Guide

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing