Intelligent CISO Issue 11 | Page 69

decrypting myths cloud credentials which can lead to catastrophic data loss. Therefore, if you have spent most of your security budget on firewalls and endpoints, you’re missing visibility and protection into your cloud services and the people who use them. Fortunately, the majority of customers we spoke with are savvy about their situation. Just like email security before it, they know they need something above the baseline, above what Office 365 provides if they want to have legitimate protection for their cloud resources. Conclusion Attackers are highly democratic, they’ll attack just about any organisation and within each organisation they will approach different targets with a combination of targeted and non- targeted threats. While solutions like sandboxing and dynamic threat analysis tools definitely represent a significant investment for businesses, if you don’t have them, you simply won’t gain insight into the attack until it’s too late. u www.intelligentciso.com | Issue 11 69