Jamie Norton, Head of Cybersecurity, NEC Australia

Dynamic Assets Require Continuous Monitoring

  • Automatic vulnerability scanning is commonly integrated into an agile app development process, but it does not end there. Many apps have built-in controls and self-validation routines.
  • With literally billions of thinly secured connected things plugged into networks all over the world, scanning and monitoring is destined to play a great role in securing the IoT.

“In the cloud, you may have passive monitoring or continuous monitoring of an environment where you’re looking for indications of compromise.”

Jamie Norton, head of cybersecurity at NEC Australia, explains that many pieces of a modern IT infrastructure present similar security challenges: lack of control over, and visibility into, infrastructure components. For example:

The cloud. “In a cloud environment, you don’t have ownership of the building blocks that make up that environment,” Norton says. “You can’t just peel back the layers and see how the operating system is built, or see how the gateways or firewalls are working. You don’t have that level of access.”

This is an excerpt from Reducing Cyber Exposure From Cloud to Containers. The eBook was generously sponsored by Tenable.