Cloud Security: This Knowledge And Skills Are in Demand

The growth rate in the cloud computing market has reached a considerable speed in recent years. According to a study by IDC, global public cloud service spending is expected to increase 19.4 percent annually by 2019, six times more than spending on the IT sector as a whole.

More and more companies are switching to the cloud. This also increases the demand for IT professionals with the skills to make the most of technology.

The rapid increase in the cloud computing market has long caused a shortage of skilled workers. Especially cloud security experts are being sought after more than ever: Information security is still the biggest concern of companies implementing cloud technologies, according to a study by BT.

<a href="https://lear

Advertisements

The growth rate in the cloud computing market has reached a considerable speed in recent years. According to a study by IDC, global public cloud service spending is expected to increase 19.4 percent annually by 2019, six times more than spending on the IT sector as a whole.

More and more companies are switching to the cloud. This also increases the demand for IT professionals with the skills to make the most of technology.

The rapid increase in the cloud computing market has long caused a shortage of skilled workers. Especially cloud security experts are being sought after more than ever: Information security is still the biggest concern of companies implementing cloud technologies, according to a study by BT.

Cloud security experts require specific, well-developed skills. We’ve put together the five most important and most requested Cloud Security Skills for you.

Compliance

As soon as a company decides to use a cloud storage or backup service, compliance becomes an important issue. The transfer of data from internal to external storage makes it necessary to ensure high data security and to ensure compliance with laws and industry regulations. In particular, with regard to the EU data protection regulation, companies need to take action soon to comply with the new regulation.

An understanding of the types of data that can be moved to the cloud or not, the careful study of potential vendors, and the use of correct terminology in service-level agreements (SLAs) – all these are imperative areas of enterprise cloud compliance. Neglecting cloud compliance can cost an organization millions. In addition to imposed financial penalties, considerable damage to the reputation threatens.

Ethical hacking

More and more popular is the so-called ethical hacking. Businesses are increasingly looking for ethical hackers and penetration testers to assess the security of private, public, and hybrid cloud environments.

Ethical hackers combine various tools, hacking and penetration techniques to uncover weaknesses in enterprise systems. Thus, security holes can be closed even before attackers detect them – damage from cyber attacks are thus prevented from the outset. The best-known qualification in this field is the Certified Ethical Hacker Certification, which includes modules on cloud computing.

Migration and platform knowledge

Platform-specific capabilities are particularly important for migration and subsequent security. Cloud experts help companies choose the right platform and understand the vendor-specific security implementation. This requires, for example, knowledge of which provider guarantees the physical security of the infrastructure and which built-in security features the platform provides.

Migration and data transfer abilities are the prerequisites for ensuring sufficient data security when moving to the cloud. In-depth knowledge of the respective cloud platform should definitely be available. For leading vendors, such as Amazon Web Services and Microsoft Azure, there are official cloud certifications for professionals to gain platform-specific knowledge.

Communication

Surprisingly, communication is one of the most important cloud security skills, completely independent of the technologies used. Cloud Security includes some complex technical concepts and terms that require explanation. The ability to communicate these intelligibly to management and non-technical personnel is critical to the correct implementation of cloud security in the enterprise.

In the ISC Global Information Security Workforce Study, 90 percent of the 14,000 respondents rank “communication” as # 1 of the most important skills for a successful information security expert.

Encoding

The hacker attack on the British provider TalkTalk last year cost the company 60 million pounds. The cause – Hackers intercepted unencrypted data packets and thus obtained personal customer information and bank data.

Secure encryption is and remains one of the most effective ways to protect sensitive data. With the enormous amount of data being transferred between the enterprise and the cloud, the development of complex encryption algorithms and the use of existing cloud encryption services are among the most valuable skills of a cloud security expert.

Singapore Wants to Register Hackers in New Law

Singapore is one of the most advanced and important countries for information security. However, a likely new local law is dividing opinions: any ethical hacker who wants to operate in the country will have to take a license.

Ethical hacking is the term used for the individual who modifies the internal aspects of devices, programs and computer networks for the “common good” without taking any kind of advantage.

The law is not yet implemented, however, if any hacker is caught – or if any individual wants to help some company via penetration tests, for example – acting without the license, will have to pay $114 Thousand and face up to two years in prison.

As noted by <a href="https://qz.com/1026300/singapores-government-wants-to-license-hackers/&quot; target=

Singapore is one of the most advanced and important countries for information security. However, a likely new local law is dividing opinions: any ethical hacker who wants to operate in the country will have to take a license.

Ethical hacking is the term used for the individual who modifies the internal aspects of devices, programs and computer networks for the “common good” without taking any kind of advantage.

The law is not yet implemented, however, if any hacker is caught – or if any individual wants to help some company via penetration tests, for example – acting without the license, will have to pay $114 Thousand and face up to two years in prison.

As noted by Joon Ian Wong of Quartz, the law is likely to be sanctioned. This is because it “is in line with the reputation of extreme order” present in Singapore – Wong lived in the country for a while.

The other side

The law is a real danger even for the local telecommunications market. Usually, teens and youngsters start hacking out of curiosity. They track videos on YouTube, read forum tutorials, chat online, and virtually conduct their studies on the internet. Most of them test the tools as a way of learning. With the law, they can be arrested.

In addition to the arrest of young hackers entering the world, the law preventing young people from testing tools ultimately inhibits their willingness to act in this segment. With that, many young people who wish to work professionally in the areas of technology and telecommunications will be discouraged.

Going further: the law could lead to better hackers. More applications and tools that hide IPs and identities can be developed. If the license is paid, ethical hackers without pocket money will start working off the government radar – and there are VPNs, Tors, encryption and various technologies to shut down the authorities.