{"id":43030,"date":"2023-01-03T10:35:26","date_gmt":"2023-01-03T10:35:26","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=98645"},"modified":"2023-01-03T10:35:26","modified_gmt":"2023-01-03T10:35:26","slug":"views-from-the-field-shifting-left-in-enterprise-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/views-from-the-field-shifting-left-in-enterprise-cloud-security\/","title":{"rendered":"Views from the field: Shifting left in enterprise cloud security \u00a0"},"content":{"rendered":"<p>Stuart Green, cloud security architect at Check Point Software, explains how businesses can mitigate cybersecurity risks. &#160; As of 2022, 94% of enterprises use cloud services. Confidence in the cloud has grown over the last 12 to 18 months, with 35% of organizations having more than 50% of their workloads in the cloud. While businesses<a class=\"excerpt-read-more\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2023\/jan\/03\/views-from-the-field-shifting-left-in-enterprise-cloud-security\/\" title=\"ReadViews from the field: Shifting left in enterprise cloud security \u00a0\">&#8230; Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2023\/jan\/03\/views-from-the-field-shifting-left-in-enterprise-cloud-security\/\">Views from the field: Shifting left in enterprise cloud security \u00a0<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.cloudcomputing-news.net\/\">Cloud Computing News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stuart Green, cloud security architect at Check Point Software, explains how businesses can mitigate cybersecurity risks. &#160; As of 2022, 94% of enterprises use cloud services. Confidence in the cloud has grown over the last 12 to 18 months, with 35&#8230;<\/p>\n","protected":false},"author":669,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6087,2336],"tags":[118],"class_list":["post-43030","post","type-post","status-publish","format-standard","hentry","category-check-point-software","category-cybersecurity","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/669"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=43030"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43030\/revisions"}],"predecessor-version":[{"id":43031,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43030\/revisions\/43031"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=43030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=43030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=43030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}