Paul Heffernan: Lifecycle Data Encryption Is Effective, But It Is Not a Magic Bullet
One strategy that some organizations are increasingly adopting is to focus on following and protecting data as it moves through the changing infrastructure. To gain better visibility into cloud assets, work with your cloud providers to conduct the vulnerability...
John Meakin: Businesses Must Focus on Protecting Information
As businesses place a greater value on maximizing data insights, they must adjust their security focus to protect information, not just infrastructure. Security leaders have an important role to play in crafting a tailored security approach that protects information...
Eric Bedell: Applying a Data-Centric Strategy in a Vast IT Ecosystem
With so many assets moving into the cloud and onto mobile devices, implementing a data-centric security strategy requires more controls built into software. Data-centric security effectively balances the costs of protection against the risk of damage, especially in a...
Antonio D’Argenio: Protecting Modern Assets Requires a Data-Centric Security Posture
Businesses can protect their modern assets by adopting a data-centric security posture. To minimize risk, a business must start thinking about security by design. “The cloud definitely offers more flexibility, but most of the time this flexibility will come with a...
Dilip Panjwani: Modern Assets Require a Disciplined, Step-by-Step Approach to Security
Modern assets require extra diligence, especially around interconnected devices. Even with careful control over data access, there is still a need for regular, or continuous, vulnerability management, which is a weakness in many organizations. “We need to ensure that...
Rory Alsop: Shifting to Software Driven Data Protection
As IT systems have become decentralized, there has been a shift in security strategies that focus more on information asset classification and securing the data. Once the app goes live, it becomes subject to continuous scanning, and there are a lot of tools that will...
Avinash Tiwari: A Fragmented Ecosystem Challenges a Coherent Security Strategy
By building security into the DevOps process, it’s easier to ensure that apps have the security controls required for the environments in which they run. The security and risk management team has an essential role to play in balancing security requirements and...
Lee Eason: Risk Management Decisions Must Be Made at the App Development Level
There is no central team controlling changes to security settings. In effect, the number of people who can make those kinds of changes has increased. The shift to application layer security actually improves the overall security of IT assets. “Good visibility is...
Darwin Sanoy: Risk Management Decisions Must Be Made at the App Development Level
Developers must have a clear understanding of how to put together, and leverage, cloud service components to deliver a level of security required by a business or an application. DevOps methodology is essential, and it needs to have automation and testing throughout...
Harshal Mehta: Securing a Complex Ecosystem Requires a Layered Strategy
While security begins at the basic level of creating trusted secure images, you also must have a secure process for developing applications that run on those images. Because end users are often targeted, work with them to help them understand risk factors associated...