
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Why Authentication is the Answer to Your Cloud Worries","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"sie1Y4aFSz\"><a href=\"https:\/\/www.otava.com\/blog\/why-authentication-is-the-answer-to-your-cloud-worries\/\">Why Authentication is the Answer to Your Cloud Worries<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/why-authentication-is-the-answer-to-your-cloud-worries\/embed\/#?secret=sie1Y4aFSz\" width=\"600\" height=\"338\" title=\"&#8220;Why Authentication is the Answer to Your Cloud Worries&#8221; &#8212; OTAVA\" data-secret=\"sie1Y4aFSz\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The following is a guest blog from Ann Arbor-based\u00a0Duo Security&#8216;s Security Evangelist, Mark Stanislav: A recent article from Forbes titled, \u201cIs Your Investment In Security Really Worth It?\u201d, called into question whether or not the money spent for information security was having impactful returns for the investments being made. Kindly enough, the author reached out to various information security vendors for their rebuttals to this unflattering portrayal of security vendors as taking more than they were contributing back to their clients. One of the responses was from the CTO of Qualys who aptly noted, &#8220;Perimeter defenses (&#8220;hard shell, soft center&#8221;) and signature-based malware programs have lost much of their effectiveness over the last few years.&#8221; This thought of course isn&#8217;t revolutionary for anyone who&#8217;s invested time and resources into cloud computing or mobile devices during the past decade. With a changing threat landscape that no longer has single-vendor networking stacks or applications from a handful of software companies, the effort to provide adequate security is becoming increasingly challenging. The question then becomes, where should you spend your money for a high return on security investment? It was determined through a survey by IDG that, &#8220;42% of cloud-based projects are eventually...","thumbnail_url":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png"}