Security News > 2021 > November > As the move to the cloud accelerates, data privacy and security remain critical
The survey revealed that as data becomes more complex, and data rules and regulations expand and evolve, new challenges such as data privacy, security, and quality have emerged that threaten to hinder data initiatives.
Further, the survey revealed that sensitive data use is on the rise, and the tasks associated with managing sensitive data - data cataloging, data discovery, and access control - are the most challenging.
The state of data privacy and security Shift to cloud computing: 65% of respondents characterized their company as already either 100% cloud-based or primarily cloud-based.
Need for data privacy and security: 64% of respondents came from companies that already collect and store sensitive data, while 88% indicated their organizations are subject to one or more data use rules or regulations, with GDPR, HIPAA, CCPA, and SOC 2 cited as the most common.
Challenge of data quality: Respondents cited data quality and validation as the most challenging area they face today, with 27% indicating they were unsure what data quality solution their organization is using.
Rise of data catalogs and data discovery: 60% of organizations are now using data catalog and data discovery tools.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Ee_afEQpZj0/
Related news
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- AWS unveils cloud security IR service for a mere $7K a month (source)
- Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security? (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Best CSPM Tools 2025: Top Cloud Security Solutions Compared (source)
- CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value? (source)
- Critical security hole in Apache Struts under exploit (source)
- CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01 (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)