Intelligent Tech Channels LATAM Issue 09 | Page 42

EXPERT SPEAK
unencrypted attacks as well as the evolving ransomware threat landscape .
The guiding principle behind zero trust is : don ’ t trust blindly ; Always check .
Currently , nearly 90 % of all Internet traffic is encrypted and most malware and threats are hidden in encrypted traffic .
If you want to keep your applications , your data and your organization safe from ransomware – and get a comprehensive , zero-trust environment – you need to encrypt these assets .
Orchestrating defense in a multicloud environment
One of the challenges of this strategy – intensifying the use of advanced encryption solutions to make it harder for criminals to access critical data – is that it has to be done in a way that doesn ’ t impact the user experience . The work of encrypting and decrypting critical data must be carried out with maximum performance and accuracy .
A cloud platform that orchestrates this process with the help of AI and ML resources can offer the necessary elasticity to preserve , for example , consumer engagement with large B2C portals – you gain in safety without increasing friction .
In the fluid world of the digital economy , the power of an encryption and decryption platform has to be distributed across the many clouds according to each organization ’ s business logic .
This is critical to exposing threats and stopping chains of ransomware attacks .
The goal is to prevent attackers from being able to monetize the crime through blackmail that affects the value of the brand . •
An unencrypted attack relies more on psychological pressure to coerce victims into paying the ransom .
42 www . intelligenttechchannels . com / latam