Security News > 2021 > November > As the move to the cloud accelerates, data privacy and security remain critical

The survey revealed that as data becomes more complex, and data rules and regulations expand and evolve, new challenges such as data privacy, security, and quality have emerged that threaten to hinder data initiatives.
Further, the survey revealed that sensitive data use is on the rise, and the tasks associated with managing sensitive data - data cataloging, data discovery, and access control - are the most challenging.
The state of data privacy and security Shift to cloud computing: 65% of respondents characterized their company as already either 100% cloud-based or primarily cloud-based.
Need for data privacy and security: 64% of respondents came from companies that already collect and store sensitive data, while 88% indicated their organizations are subject to one or more data use rules or regulations, with GDPR, HIPAA, CCPA, and SOC 2 cited as the most common.
Challenge of data quality: Respondents cited data quality and validation as the most challenging area they face today, with 27% indicating they were unsure what data quality solution their organization is using.
Rise of data catalogs and data discovery: 60% of organizations are now using data catalog and data discovery tools.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Ee_afEQpZj0/
Related news
- What native cloud security tools won’t catch (source)
- Observability is security’s way back into the cloud conversation (source)
- Google's got a hot cloud infosec startup, a new unified platform — and its eye on Microsoft's $20B+ security biz (source)
- Skyhawk Security brings preemptive cloud app defense to RSAC 2025 (source)
- Ransomware spike exposes cracks in cloud security (source)
- Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals (source)
- Closing security gaps in multi-cloud and SaaS environments (source)
- AI forces security leaders to rethink hybrid cloud strategies (source)
- ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs (source)