Google recently rebranded their cloud work tools as G Suite, incorporating Gmail and Google Drive. Companies are flocking to cloud file sharing services like Google Drive, Office 365, Box, and Dropbox for Work as convenient, powerful platforms for sharing information. The top cloud providers offer such strong security that companies use their apps to store everything from payment information to intellectual property; new research found 18.1 percent of documents uploaded to file sharing services contain sensitive data.

Have companies grown too confident in the security of their data in enterprise cloud apps? For the most part, security teams do not worry about external hacks of the service provider’s infrastructure. A legal case from San Francisco gaming company Zynga illustrates why companies are increasingly worried about internal misuse of cloud data by employees.

Zynga is suing two former employees on claims they stole confidential corporate data before defecting to a competitor. One of the employees, a creative director, allegedly downloaded ten folders from a corporate Google Drive account and then uploaded the data to a USB drive. The theft did not require any advanced technology and only came to light during an investigation into a series of departures. While security teams are used to detailed monitoring capabilities focused on their networks, cloud applications circumvent traditional security measures. Zynga’s incident is a reminder for companies to implement behavioral monitoring for data in the cloud, especially when applications are used for intellectual property.

The Definitive Guide to Cloud Threat Protection

Download the complete 40-page ebook with recommendations on protecting cloud data.

Download Now

Across the world, a complex virus inflicted substantial damage on targets in the Middle East. Researchers suspect Iranian state-sponsored groups of unleashing Shamoon, which wipes the drives of infected machines. This isn’t the first time an organization in the energy sector has become the target of politically motivated nation-state attackers. To protect against these complex attacks, security experts recommend keeping software updated and detecting behavioral anomalies indicative of an outside threat.

If the last few years’ worth of cybersecurity incidents has taught us anything, it’s that no organization is immune. The European Commission became the latest organization to suffer from a DDoS attack. Far less severe than a data breach, the attack mainly constitutes an inconvenience. Lately, companies have struggled to deal with DDoS attacks as new methods have taken advantage of vulnerable IoT devices.

It’s easy to forget that information security did not always have the same level of visibility. Before the era of mega breaches, cybersecurity was relegated to a much smaller circle of industry insiders. Now cybersecurity can be found on the front page of newspapers, in boardrooms, and even the debate floor of the presidential election.

Information security professionals face new opportunities in this transformed industry, but they also need to learn new skills and build teams differently. The path to the CISO’s seat remains a mystery to many new entrants. An interview with Arrow CSO Sameer Sait provides a map for how to rise to the CISO position and build a modern security team. Sait espouses the benefits of operating a lean team focused on providing business value and quantitative risk reduction.