
Caleb Sima: Securing Applications Is an Incredibly Complex Task
While the cloud offers many benefits, businesses face challenges in securely managing and obtaining visibility into their assets. Organizations that adopt a hybrid approach to keep their most valuable assets on premises will need to seamlessly protect assets across...

Andy Boura: Manage Security as a Shared Responsibility
Moving to the cloud doesn’t change what you need to secure, but it completely changes how you manage security and risk. Successfully sharing responsibility for IT security and risk management means clearly understanding where your vendor’s capabilities and...

Javed Ikbal: Cloud Services Force You to Reconsider Your Risk Model
With business groups launching and using cloud-based services, IT is no longer the gating factor for IT infrastructure. Risks change, but whether it’s in the cloud or on premises, you still have to encrypt data, only give access to those who need it, and make sure...

Scott Estes: Maintaining a Love/Hate Relationship with Modern Assets
Modern assets are forcing a new way of approaching security, whereby everyone in the organization must take security seriously and understand the potential consequences of even the simplest action. Security teams are no longer the gating factor they once were....

Cassio Goldschmidt: Innovative Identity Management Protects Modern Assets
Authentication is often key to protecting modern assets, regardless of the type of attack. It is important to make your attack surface as small as possible—that is, to take a close look at what you have in place and disable what you don’t need. “Some companies are...

Mannie Romero: The Leap from Securing Static to Dynamic Assets Is a Management Challenge
Maintaining high-level security across all assets is a resource drain in large enterprises. Security leaders need to analyze cyber exposure so they can segment risk based on asset criticality and vulnerability. The shortage of security talent in this new world of...

Lester Godsey: Managing Risk Requires New Levels of Visibility
The essential problems of risk management do not change. The key is expanding these methodologies to cover the new and changing IT landscape. Consolidating security functions into higher-power solutions enables greater flexibility and a deeper inspection of network...

Floyd Fernandes: Visibility into Your Entire IT Ecosystem Is Fundamental
It all comes down to having visibility into the digital assets you are trying to protect, whether they are in the data center or in the cloud. Whether you are reverting to golden images for short-lived assets, tracking container formation in real time, or...

David Carvalho: You Must Account for Entirely New Kinds of Risks
You can have a provider with many certifications and service-level agreements in place, but providers will not be liable for your losses or for your non-compliance. In a blockchain strategy, you use continuous polling to validate all devices. A hacker would need to...

Carlos Lerma: Collaboration is Key to Securing a Dynamic IT Environment
When it comes to introducing new technologies, a more collaborative involvement of IT project managers, business stakeholders, and security architects results in better security. One way to ensure security of outsourced web apps is to run vulnerability scans on them...