{"id":606212,"date":"2023-02-09T07:49:04","date_gmt":"2023-02-09T13:49:04","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/02\/09\/the-clouds-growing-impact-on-cybersecurity\/"},"modified":"2023-02-09T07:49:04","modified_gmt":"2023-02-09T13:49:04","slug":"the-clouds-growing-impact-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/02\/09\/the-clouds-growing-impact-on-cybersecurity\/","title":{"rendered":"The cloud\u2019s growing impact on cybersecurity"},"content":{"rendered":"<p><a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity\u2019s<\/a> most proven innovation catalyst continues to be the many challenges of securing cloud infrastructure. The cloud has won the enterprise, <a href=\"https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Cloud_computing_-_statistics_on_the_use_by_enterprises\" target=\"_blank\" rel=\"noreferrer noopener\">dominating<\/a><a href=\"https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Cloud_computing_-_statistics_on_the_use_by_enterprises\"> large enterprises\u2019 tech stacks<\/a>. The average enterprise uses <a href=\"https:\/\/techpricecrunch.com\/blog\/cloud-computing-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">1,427<\/a><a href=\"https:\/\/techpricecrunch.com\/blog\/cloud-computing-statistics\/\"> cloud services<\/a>, and the average enterprise employee uses up to 36 cloud services, including platforms for collaboration and file-sharing.<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/document\/4021245?ref=solrResearch&#038;refval=353569924\">By <\/a><a href=\"https:\/\/www.gartner.com\/document\/4021245?ref=solrResearch&#038;refval=353569924\" target=\"_blank\" rel=\"noreferrer noopener\">2023<\/a>, 70% of all enterprise workloads will be deployed in cloud infrastructure, up from 40% in 2020. AI and machine learning are accelerating innovation, providing new insights into threats and risks in real time. <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike\u2019s<\/a> rapid advances in <a href=\"https:\/\/venturebeat.com\/2022\/06\/15\/what-is-artificial-intelligence\/\">AI<\/a> and <a href=\"https:\/\/venturebeat.com\/ai\/artificial-intelligence-ai-vs-machine-learning-ml-key-comparisons\/\">machine learning<\/a> exemplify how endpoint security providers are <a href=\"https:\/\/venturebeat.com\/security\/5-ways-endpoints-are-turbocharging-cybersecurity-innovation\/\">capitalizing on<\/a><a href=\"https:\/\/venturebeat.com\/security\/5-ways-endpoints-are-turbocharging-cybersecurity-innovation\/\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/venturebeat.com\/security\/5-ways-endpoints-are-turbocharging-cybersecurity-innovation\/\">threat data to innovate quickly<\/a>, for example.\u00a0\u00a0<\/p>\n<p>The cloud\u2019s dominance of enterprise networks and tech stacks is fueling IT\u2019s biggest and fastest-growing market. <a href=\"https:\/\/www.gartner.com\/document\/4022403?ref=solrAll&#038;refval=353562662\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a> predicts worldwide public cloud services will grow from $604.9 billion in 2023 to $1 trillion by 2026, attaining a compound annual growth rate (CAGR) of 18.24%. The fastest-growing segments of public cloud services include database management, business intelligence, security, and infrastructure-as-a-service (IaaS). Spending on public <a href=\"https:\/\/www.gartner.com\/document\/4022403?ref=solrAll&#038;refval=353562662\">cloud <\/a><a href=\"https:\/\/www.gartner.com\/document\/4022403?ref=solrAll&#038;refval=353562662\" target=\"_blank\" rel=\"noreferrer noopener\">security<\/a><a href=\"https:\/\/www.gartner.com\/document\/4022403?ref=solrAll&#038;refval=353562662\"> services<\/a> is forecast to grow from $19.4 billion in 2022 to $48.9 billion in 2026, attaining a CAGR of 20.3%. <a href=\"https:\/\/www.cloudwards.net\/cloud-computing-statistics\/\">Ninety-four <\/a><a href=\"https:\/\/www.cloudwards.net\/cloud-computing-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">percent<\/a><a href=\"https:\/\/www.cloudwards.net\/cloud-computing-statistics\/\"> of enterprises use cloud services<\/a> today, and 75% say security is a top concern. <a href=\"https:\/\/techjury.net\/blog\/cloud-computing-statistics\/#gref\">Sixty-<\/a><a href=\"https:\/\/techjury.net\/blog\/cloud-computing-statistics\/#gref\" target=\"_blank\" rel=\"noreferrer noopener\">seven<\/a><a href=\"https:\/\/techjury.net\/blog\/cloud-computing-statistics\/#gref\"> percent of enterprises<\/a> have already standardized their infrastructures on the cloud.<\/p>\n<p>As enterprises lift and shift their workloads to the cloud, they face greater risks of breaches, accidentally misconfigured cloud platforms, and inconsistent identity access management (IAM) and privileged access management (PAM) coverage across hyperscalers and cloud platforms. <a href=\"https:\/\/www.gartner.com\/interactive\/hc\/4016632?ref=solrAll&#038;refval=353686035\">Gartner<\/a> predicts that at least 99% of cloud security failures will be the user\u2019s fault, accentuating the need for continuously training IT and security teams on the latest cloud security techniques.\u00a0<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>More than <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\">$1.3 trillion in enterprise IT <\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\" target=\"_blank\" rel=\"noreferrer noopener\">spending<\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\"> is at stake<\/a>, and this will grow to almost $1.8 trillion in 2025. By that year, 51% of IT spending will be on\u00a0<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-08-02-gartner-says-four-trends-are-shaping-the-future-of-public-cloud\">public <\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-08-02-gartner-says-four-trends-are-shaping-the-future-of-public-cloud\" target=\"_blank\" rel=\"noreferrer noopener\">cloud<\/a> services, compared to 41% in 2022. Almost two-thirds (65.9%) of spending on application software will be directed toward cloud technologies in 2025, up from 57.7% in 2022.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" data-lazy-fallback=\"1\" width=\"825\" height=\"564\" alt=\"Gartner, Sizing Cloud Shift\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=825&#038;strip=all 825w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?w=578&#038;strip=all 578w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact1.png?resize=825%2C564&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>According to Gartner, enterprise IT spending on cloud computing is projected to surpass spending on traditional IT by 2025. Source: <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\">Gartner Says More Than Half of Enterprise IT <\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\" target=\"_blank\" rel=\"noreferrer noopener\">Spending<\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\"> in Key Market Segments Will Shift To The<\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\">Cloud By 2025<\/a><\/figcaption><\/figure>\n<h2 id=\"h-why-cloud-security-is-driving-innovation\">Why cloud security is driving innovation<\/h2>\n<p>\u201cAdding security should be a business enabler. It should be something that adds to your business resiliency, and it should be something that helps protect the productivity gains of digital transformation,\u201d said George Kurtz, CrowdStrike\u2019s co-founder and CEO, during his keynote at the company\u2019s <a href=\"https:\/\/venturebeat.com\/security\/crowdstrikes-platform-plan-at-fal-con-melds-security-and-observability\/\">Fal.Con event<\/a> last year.\u00a0<\/p>\n<p>There is strong demand from enterprises looking to secure their increasingly complex cloud infrastructures and tech stacks. Gartner predicts enterprise spending on cloud security will double between 2023 and 2026, growing from $6.4 billion to $12.9 billion. Worldwide end-user spending on information security and risk management will grow from <a href=\"https:\/\/www.gartner.com\/document\/code\/777827?ref=ddisp&#038;refval=777827\">$167.86 billion in 2022 to $261.48 billion in 2026<\/a>, achieving a CAGR of 11.1%. That demand is driving higher levels of R&#038;D spending across cybersecurity vendors and startups.<\/p>\n<p>CISOs and CIOs often collaborate on building business cases for their most challenging cloud security initiatives. This includes <a href=\"https:\/\/venturebeat.com\/security\/building-a-business-case-for-zero-trust-multicloud-security\/\">cases for <\/a><a href=\"https:\/\/venturebeat.com\/security\/building-a-business-case-for-zero-trust-multicloud-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero<\/a><a href=\"https:\/\/venturebeat.com\/security\/building-a-business-case-for-zero-trust-multicloud-security\/\">-trust and multicloud security<\/a>, for example.\u00a0<\/p>\n<p>During his keynote at <a href=\"https:\/\/venturebeat.com\/security\/crowdstrikes-platform-plan-at-fal-con-melds-security-and-observability\/\">Fal.<\/a><a href=\"https:\/\/venturebeat.com\/security\/crowdstrikes-platform-plan-at-fal-con-melds-security-and-observability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Con<\/a>, Kurtz explained how enterprise cybersecurity vendors are innovating faster to keep up with enterprises\u2019 needs. He highlighted that CrowdStrike had earned the reputation of being \u201cthe Salesforce of security\u201d due to its cloud-based architecture. This architecture brings greater UX and UI flexibility, allowing users to integrate with existing on-premises systems easily. CrowdStrike\u2019s focus on devops and product development is evident in its track record of successful new products. Its teams evidently have the agility to quickly iterate on its platform.<\/p>\n<p>In an interview with VentureBeat, <a href=\"https:\/\/www.linkedin.com\/in\/amolsk\/\">Amol <\/a><a href=\"https:\/\/www.linkedin.com\/in\/amolsk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kulkarni<\/a>, chief product and engineering officer at CrowdStrike, said, \u201cIf you have the core infrastructure in the right place, then you can iterate rapidly and build out products much faster because the baseline is there. The second part is that we have this notion of collecting once and us[ing] multiple times. So that is based on \u2026 collecting all the telemetry in the security of the cloud and then adding additional analytics for different scenarios. So that gives us that velocity.\u201d<\/p>\n<h2>Where cloud\u2019s impact is greatest\u00a0<\/h2>\n<p>The digital transformation initiatives George Kurtz spoke of in his keynote at Fal.Con Last year are examples of the new business initiatives requiring CISOs and CIOs to rethink how they implement cybersecurity as a team. New SaaS applications, legacy on-premise applications that integrate into hybrid cloud configurations, multicloud, and the lack of IAM support across different hyperscalers all <a href=\"https:\/\/carnegieendowment.org\/2019\/08\/28\/new-tech-new-threats-and-new-governance-challenges-opportunity-to-craft-smarter-responses-pub-79736\">increase <\/a><a href=\"https:\/\/carnegieendowment.org\/2019\/08\/28\/new-tech-new-threats-and-new-governance-challenges-opportunity-to-craft-smarter-responses-pub-79736\" target=\"_blank\" rel=\"noreferrer noopener\">attack<\/a><a href=\"https:\/\/carnegieendowment.org\/2019\/08\/28\/new-tech-new-threats-and-new-governance-challenges-opportunity-to-craft-smarter-responses-pub-79736\"> surfaces<\/a>.\u00a0<\/p>\n<p>Many emerging technologies are being fast-tracked to market to help enterprises deal with the exponentially increasing number of attack surfaces. <a href=\"https:\/\/venturebeat.com\/security\/how-self-healing-endpoints-are-a-solution-to-identities-under-siege\/\" target=\"_blank\" rel=\"noreferrer noopener\">Protecting<\/a><a href=\"https:\/\/venturebeat.com\/security\/how-self-healing-endpoints-are-a-solution-to-identities-under-siege\/\"> all forms of identities is critical today, as they\u2019re under siege<\/a>. The reasons include growing gaps between operational technology (OT) and IT systems; fast-growing <a href=\"https:\/\/venturebeat.com\/data-infrastructure\/supply-chain-disruption-why-iot-is-failing-to-join-the-dots\/\">Internet of <\/a><a href=\"https:\/\/venturebeat.com\/data-infrastructure\/supply-chain-disruption-why-iot-is-failing-to-join-the-dots\/\" target=\"_blank\" rel=\"noreferrer noopener\">Things<\/a><a href=\"https:\/\/venturebeat.com\/data-infrastructure\/supply-chain-disruption-why-iot-is-failing-to-join-the-dots\/\"> (IoT)<\/a> networks and numbers of endpoints; and the need to protect supply chain touchpoints with self-healing endpoints.<\/p>\n<p>CISOs\u2019 and CIOs\u2019 future careers will depend on how well they orchestrate these technologies, including SaaS applications, to drive revenue. SaaS application-based revenue is expected to grow at a 9% CAGR between 2020 and 2023 to a value of <a href=\"https:\/\/www.datapine.com\/blog\/saas-trends\/\">$60.36 <\/a><a href=\"https:\/\/www.datapine.com\/blog\/saas-trends\/\" target=\"_blank\" rel=\"noreferrer noopener\">billion<\/a>. The global SaaS market is valued at around $3 trillion and could <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-saas-factor-six-ways-to-drive-growth-by-building-new-saas-businesses\">surge to $10 <\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-saas-factor-six-ways-to-drive-growth-by-building-new-saas-businesses\" target=\"_blank\" rel=\"noreferrer noopener\">trillion<\/a><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/the-saas-factor-six-ways-to-drive-growth-by-building-new-saas-businesses\"> by 2030<\/a>.<\/p>\n<p>Gartner\u2019s latest <a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\">Security<\/a><a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\">Radar<\/a> provides a valuable framework for evaluating the contributions cloud is making to cybersecurity in general and zero trust specifically. Gartner identifies six core themes driving cloud-based cybersecurity innovation:<\/p>\n<ul>\n<li>Securing cloud service usage<\/li>\n<li>The expansion of attack surfaces<\/li>\n<li>Identities as the new security perimeter<\/li>\n<li>Adoption of new approaches to cybersecurity, designed to deliver the <a href=\"https:\/\/venturebeat.com\/security\/how-crowdstrike-consolidates-tech-stacks-as-a-growth-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">consolidation<\/a><a href=\"https:\/\/venturebeat.com\/security\/how-crowdstrike-consolidates-tech-stacks-as-a-growth-strategy\/\"> CISOs are asking for in their tech stack<\/a>, with<strong> <\/strong><a href=\"https:\/\/venturebeat.com\/business\/zero-trust-network-access-should-be-on-every-cisos-sase-roadmap\/#:~:text=Zero%20Trust%20Network%20Access%20(ZTNA,secure%20endpoints%20across%20an%20enterprise.\" target=\"_blank\" rel=\"noreferrer noopener\">SASE<\/a>, <a href=\"https:\/\/venturebeat.com\/security\/xdr-vs-mdr-how-to-pick-the-right-one-for-your-security-needs\/\" target=\"_blank\" rel=\"noreferrer noopener\">XDR<\/a> and other technologies being used for this purpose<\/li>\n<li>The use of the same technologies for new delivery models<\/li>\n<li>Security automation, including hyperautomation, and AI, which have the potential to alleviate the chronic worker shortages many enterprises are facing<\/li>\n<\/ul>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"975\" height=\"838\" alt=\"Gartner's Impact Radar for Security\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=975&#038;strip=all 975w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=698&#038;strip=all 698w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact3.png?resize=975%2C838&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>Gartner\u2019s latest Impact Radar on Security provides a useful framework for identifying the innovations cloud security is helping to accelerate across enterprises. Source: <a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\">Emerging Tech Impact Radar: Security Published <\/a><a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\" target=\"_blank\" rel=\"noreferrer noopener\">16<\/a><a href=\"https:\/\/engage.morphisec.com\/gartner-emerging-technologies-trends-2023\"> November 2022 \u2014 ID G00766277 courtesy of Morphisec reprint<\/a><\/figcaption><\/figure>\n<h2>AI and machine learning are filling a critical cloud security niche<\/h2>\n<p>Global spending on <a href=\"https:\/\/www.globenewswire.com\/news-release\/2020\/05\/28\/2040510\/0\/en\/Global-AI-in-Cybersecurity-Market-is-expected-to-reach-USD-30-5-billion-by-2025-witnessing-20-5-CAGR-during-the-forecast-period-2020-2025.html\">AI in <\/a><a href=\"https:\/\/www.globenewswire.com\/news-release\/2020\/05\/28\/2040510\/0\/en\/Global-AI-in-Cybersecurity-Market-is-expected-to-reach-USD-30-5-billion-by-2025-witnessing-20-5-CAGR-during-the-forecast-period-2020-2025.html\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> is estimated to grow from $12 billion in 2020 to $30.5 billion by 2025. Enterprises and the cybersecurity vendors serving them continue to invest heavily in AI and machine learning. The goal is to make sense of massive amounts of data and deliver dependable insights.<\/p>\n<p>Numerous early successes in <a href=\"https:\/\/venturebeat.com\/2022\/06\/15\/what-is-artificial-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI<\/a> have involved identifying sophisticated security risks by running behavioral analysis on files before they are run or after they have been executed. Using AI and <a href=\"https:\/\/venturebeat.com\/ai\/artificial-intelligence-ai-vs-machine-learning-ml-key-comparisons\/\" target=\"_blank\" rel=\"noreferrer noopener\">machine learning<\/a> to detect anomalies helps speed investigation by linking and combining related notification signals. This augmented detection fortifies alerts by automatically determining what additional data is necessary for an investigation and collecting, normalizing and visualizing that data before the actual investigation begins.<\/p>\n<p>Enterprises will often use AI-based security operations apps and platforms to create playbooks that define the most effective deterrence and risk mitigation steps, depending on what has been successful in the past at defining cloud-based threat surfaces. Artificial Intelligence scans and either recommends or, in more trustworthy situations, instantly executes the next steps, thus saving the analyst the time they would have needed to figure out these stages. Leading vendors in this market include <a href=\"https:\/\/www.bluvector.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">BluVector<\/a>, <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a>, <a href=\"https:\/\/cybersec.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersec<\/a>, <a href=\"https:\/\/cyware.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyware<\/a>, <a href=\"https:\/\/www.exabeam.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Exabeam<\/a>, <a href=\"https:\/\/logrhythm.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">LogRhythm<\/a>, <a href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rapid7<\/a>, <a href=\"https:\/\/www.servicenow.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ServiceNow<\/a>, <a href=\"https:\/\/www.arcanna.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Siscale<\/a><a href=\"https:\/\/www.arcanna.ai\/\"> (Arcanna.ai)<\/a> and <a href=\"https:\/\/stellarcyber.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stellar<\/a><a href=\"https:\/\/stellarcyber.ai\/\"> Cyber<\/a>.\u00a0<\/p>\n<h2>Behind CIEM\u2019s rapid growth<\/h2>\n<p><a href=\"https:\/\/venturebeat.com\/security\/how-cisos-get-multicloud-security-right-with-ciem\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud infrastructure entitlements management (CIEM)<\/a> helps identify incorrectly configured access rights and permissions on cloud platforms while enforcing least privileged access. CIEM\u2019s rapid growth is attributable to the increasing complexity of configuring multicloud, hybrid cloud and private cloud configurations.<\/p>\n<p>CIEM systems flag and alert risks or inappropriate behavior and <a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/ciem-explained-managing-cloud-entitlements-in-a-multicloud-world\">use <\/a><a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/ciem-explained-managing-cloud-entitlements-in-a-multicloud-world\" target=\"_blank\" rel=\"noreferrer noopener\">automation<\/a><a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/ciem-explained-managing-cloud-entitlements-in-a-multicloud-world\"> to change policies and entitlements.<\/a> The current generation of CIEM platforms manage access rights, permissions and privileges for the tens of thousands of identities that rely on a multicloud environment, enforcing the principle of least privilege. This helps to identify and <a href=\"https:\/\/sysdig.com\/learn-cloud-native\/cloud-security\/what-is-cloud-infrastructure-entitlements-management-ciem\/\">avoid risks <\/a><a href=\"https:\/\/sysdig.com\/learn-cloud-native\/cloud-security\/what-is-cloud-infrastructure-entitlements-management-ciem\/\" target=\"_blank\" rel=\"noreferrer noopener\">resulting<\/a><a href=\"https:\/\/sysdig.com\/learn-cloud-native\/cloud-security\/what-is-cloud-infrastructure-entitlements-management-ciem\/\"> from excessive permissions<\/a>.<\/p>\n<p>CIEM also pays off in cloud configurations by providing visibility across all permissions assigned to all identities, actions and resources across cloud infrastructures and <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/cloud-infrastructure-entitlement-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">enforcing<\/a><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/cloud-infrastructure-entitlement-management\/\"> least privilege access to reduce access risks<\/a>.<\/p>\n<p>Leading CIEM vendors include <a href=\"https:\/\/www.authomize.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Authomize<\/a>, <a href=\"https:\/\/www.britive.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Britive<\/a>, <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a>, <a href=\"https:\/\/www.cyberark.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CyberArk<\/a>, <a href=\"https:\/\/ermetic.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ermetic<\/a>, <a href=\"https:\/\/blogs.microsoft.com\/blog\/2021\/07\/21\/microsoft-acquires-cloudknox-security-to-offer-unified-privileged-access-and-cloud-entitlement-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a>, <a href=\"https:\/\/www.sailpoint.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">SailPoint<\/a>, <a href=\"https:\/\/saviynt.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Saviynt<\/a>, <a href=\"https:\/\/www.sentinelone.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">SentinelOne<\/a><a href=\"https:\/\/www.sentinelone.com\/\"> (Attivo Networks)<\/a>, <a href=\"https:\/\/sonraisecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sonrai<\/a><a href=\"https:\/\/sonraisecurity.com\/\"> Security<\/a> and <a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zscaler<\/a>.<\/p>\n<p>Scott Fanning, senior director of product management and cloud security at CrowdStrike, told VentureBeat that the company\u2019s approach to CIEM enables enterprises to prevent identity-based threats from turning into breaches because of improperly configured cloud entitlements across public cloud service providers. \u201cWe\u2019re having more discussions about identity governance and identity deployment in boardrooms,\u201d he told VentureBeat during a recent interview.\u00a0CrowdStrike\u2019s key design goals include enforcing least privileged access to clouds and providing continuous detection and remediation of identity threats.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"1430\" height=\"1319\" alt=\"CrowdStrike CIEM\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=1430&#038;strip=all 1430w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=650&#038;strip=all 650w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact2.png?resize=1430%2C1319&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>CrowdStrike\u2019s approach to CIEM provides insights into the most active indicators of attack (IoAs), policy violations and configuration assessments by policy for identities, while reporting lateral movement and least privilege violations to the credential policy level. Source: CrowdStrike<\/figcaption><\/figure>\n<h2>Greater reliance on diverse cloud infrastructure drives innovation in expanded CNAPP<\/h2>\n<p>Several leading cybersecurity vendors have taken on the ambitious goal of improving their <a href=\"https:\/\/venturebeat.com\/security\/gartner-research-finds-no-single-tool-protects-app-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud-native application protection platform (CNAPP)<\/a> capabilities to keep pace with the new complexity of multicloud configurations in the enterprise. Vendors with CNAPP on their roadmaps include <a href=\"https:\/\/www.aquasec.com\/\">Aqua <\/a><a href=\"https:\/\/www.aquasec.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security<\/a>, <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a>, <a href=\"https:\/\/lacework.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lacework<\/a>, <a href=\"https:\/\/orca.security\/\">Orca <\/a><a href=\"https:\/\/orca.security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/\">Palo <\/a><a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Alto<\/a><a href=\"https:\/\/www.paloaltonetworks.com\/\"> Networks<\/a>, <a href=\"https:\/\/www.rapid7.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rapid7<\/a> and <a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\">Trend <\/a><a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\" target=\"_blank\" rel=\"noreferrer noopener\">Micro<\/a>.\u00a0<\/p>\n<p>CrowdStrike is the home of one of the most noteworthy developments in this area. The CNAPP capabilities of <a href=\"https:\/\/www.crowdstrike.com\/products\/cloud-security\/\">CrowdStrike\u2019s <\/a><a href=\"https:\/\/www.crowdstrike.com\/products\/cloud-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud<\/a><a href=\"https:\/\/www.crowdstrike.com\/products\/cloud-security\/\"> Security<\/a> include new CIEM features and the integration of CrowdStrike Asset Graph. The latter offers a way to get an overview of cloud-based assets and better understand and protect cloud identities and permissions using both CIEM and CNAPP. With these two tools, enterprises can gain visibility and control over which and how users are accessing their cloud-based resources.<\/p>\n<p>CrowdStrike\u2019s Fanning told VentureBeat that the company\u2019s approach to CIEM enables organizations to prevent identity-based threats resulting from improperly configured cloud entitlements across public cloud service providers.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"1400\" height=\"787\" alt=\"CrowdStrike Asset Graph\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=1400&#038;strip=all 1400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact5.png?resize=1400%2C787&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>CrowdStrike\u2019s Asset Graph offers a comprehensive view of an enterprise\u2019s assets and how they interact with each other at the host, configuration, identity and application levels. Source: CrowdStrike<\/figcaption><\/figure>\n<h2>XDR quickly becoming core to cloud security\u2019s future<\/h2>\n<p><a href=\"https:\/\/venturebeat.com\/2022\/03\/15\/xdr-driven-security-industry-consolidation-continues-with-sentinelone-to-acquire-attivo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Extended detection and response (XDR)<\/a> is a cloud-based threat detection investigation and response (TDIR) platform that integrates, correlates and contextualizes data and alerts from multiple security prevention, detection and response components. During VentureBeat\u2019s interviews with CrowdStrike\u2019s customers at Fal.Con last year and Palo Alto Networks\u2019 customers at <a href=\"https:\/\/venturebeat.com\/security\/at-ignite-22-cybersecurity-conference-palo-alto-networks-looks-to-capitalize-on-consolidation\/\">Ignite \u2018<\/a><a href=\"https:\/\/venturebeat.com\/security\/at-ignite-22-cybersecurity-conference-palo-alto-networks-looks-to-capitalize-on-consolidation\/\" target=\"_blank\" rel=\"noreferrer noopener\">22<\/a>, we found that XDR is gaining traction particularly in the financial services, insurance and professional services industries, which are known for the complexity of their cloud-based infrastructures and tech stacks. Leading cybersecurity vendors offering XDR platforms include <a href=\"https:\/\/www.crowdstrike.com\/\">CrowdStrike<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/\">Microsoft<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/\">Palo Alto Networks<\/a>, <a href=\"https:\/\/tehtris.com\/en\/\">TEHTRIS<\/a> and <a href=\"https:\/\/www.trendmicro.com\/en_us\/business.html\">Trend Micro<\/a>.\u00a0<\/p>\n<p>XDR platforms such asCrowdStrike Falcon, Cortex XDR and Microsoft 365 Defender use data from various sources to provide a unified, 360-degree view of all alerts, events and potential risks captured by an enterprise\u2019s telemetry data. Nearly all such platforms rely on AI and machine learning to process data, detect anomalies and deliver insights to security teams, most often on a cloud-based unified cloud platform. Leading XDR providers, including CrowdStrike, also support open APIs for integration and streamlining automation at scale. XDR platforms are being used to further deliver consolidation options to CISOs who want to reduce costs and improve visibility by having fewer cybersecurity apps deliver more value.\u00a0<\/p>\n<p><a href=\"https:\/\/venturebeat.com\/security\/why-extended-detection-and-response-xdr-is-seeing-enterprise-growth\/\">CISOs and CIOs tell VentureBeat XDR is<\/a><a href=\"https:\/\/venturebeat.com\/security\/why-extended-detection-and-response-xdr-is-seeing-enterprise-growth\/\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/venturebeat.com\/security\/why-extended-detection-and-response-xdr-is-seeing-enterprise-growth\/\">gaining traction<\/a> with IT and security departments that don\u2019t have the time or resources to integrate diverse applications that can extend beyond endpoints and want to gain real-time visibility and control using telemetry data.\u00a0One of CISOs\u2019 most common complaints is that existing security systems are not equipped to store log files for an extended period. <a href=\"https:\/\/www.crowdstrike.com\/press-releases\/crowdstrike-to-acquire-humio\/\">CrowdStrike\u2019s\u2019 acquisition of <\/a><a href=\"https:\/\/www.crowdstrike.com\/press-releases\/crowdstrike-to-acquire-humio\/\" target=\"_blank\" rel=\"noreferrer noopener\">Humio<\/a> is considered a step toward solving this issue, indicating a prescient move toward XDR\u2019s future.\u00a0<a href=\"https:\/\/newsroom.ibm.com\/2022-06-06-IBM-Tackles-Growing-Attack-Surface-Risks-with-Plans-to-Acquire-Randori\">IBM\u2019s acquisition of <\/a><a href=\"https:\/\/newsroom.ibm.com\/2022-06-06-IBM-Tackles-Growing-Attack-Surface-Risks-with-Plans-to-Acquire-Randori\" target=\"_blank\" rel=\"noreferrer noopener\">Randori<\/a>,\u00a0<a href=\"https:\/\/www.elastic.co\/blog\/endgame-joins-forces-with-elastic\" target=\"_blank\" rel=\"noreferrer noopener\">Elastic\u2019s<\/a><a href=\"https:\/\/www.elastic.co\/blog\/endgame-joins-forces-with-elastic\"> of Endgame<\/a> and <a href=\"https:\/\/venturebeat.com\/2021\/02\/09\/sentinelone-bolsters-its-big-data-analytics-with-155-million-scalyr-acquisition\/\" target=\"_blank\" rel=\"noreferrer noopener\">SentinelOne\u2019s<\/a><a href=\"https:\/\/venturebeat.com\/2021\/02\/09\/sentinelone-bolsters-its-big-data-analytics-with-155-million-scalyr-acquisition\/\"> of Scalyr<\/a> reflect how critical XDR is to cybersecurity vendors\u2019 cloud security roadmaps and strategies.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"1008\" height=\"502\" alt=\"CrowdStrike XDR architecture\"   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=1008&#038;strip=all 1008w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=100&#038;strip=all 100w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=350&#038;strip=all 350w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=930&#038;strip=all 930w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?w=700&#038;strip=all 700w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/02\/cloudimpact4.png?resize=1008%2C502&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>An XDR platform is designed to integrate threat detection and response across a company\u2019s security infrastructure. The platform centralizes security data from multiple sources and uses AI and machine learning to improve threat visibility, speed up response time and provide comprehensive protection against cyberattacks. Source: CrowdStrike<\/figcaption><\/figure>\n<h2>Conclusion\u00a0<\/h2>\n<p>Digital transformation initiatives redefining enterprises today require CISOs and CIOs to rethink how they implement cybersecurity as a team. New SaaS applications, legacy on-premise applications that integrate into hybrid cloud configurations, multicloud, and the lack of IAM support across different hyperscalers all increase attack surfaces. Shrinking attack surfaces with the new, innovative cybersecurity technologies are core to any enterprise\u2019s revenue growth and future.\u00a0<\/p>\n<p>The more enterprises shift their workloads to the cloud, the greater the risk of breaches and loss of sensitive information. To meet these challenges, new ways of protecting cloud infrastructures and endpoints alongside traditional strategies for data center security are essential. Gartner predicts that more than $1.3 trillion in enterprise IT spending will shift to the public cloud by 2025.<\/p>\n<p>By investing in new products, asset management solutions and automation, enterprises can reduce the risks associated with moving IT workloads to the cloud while maintaining compliance and visibility into operations.<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/the-clouds-growing-impact-on-cybersecurity\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Louis Columbus<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity\u2019s most proven innovation catalyst continues to be the many challenges of securing cloud infrastructure. The cloud has won the enterprise, dominating large enterprises\u2019 tech stacks. The average enterprise uses 1,427 cloud services, and the average enterprise employee uses up to 36 cloud services, including platforms for collaboration and file-sharing.By 2023, 70% of all enterprise<\/p>\n","protected":false},"author":1,"featured_media":606213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32709,29232,46],"tags":[],"class_list":{"0":"post-606212","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","8":"category-growing","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/606212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=606212"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/606212\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/606213"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=606212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=606212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=606212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}