Lifecycle Data Encryption Is Effective, But It Is Not a Magic Bullet
- One strategy that some organizations are increasingly adopting is to focus on following and protecting data as it moves through the changing infrastructure.
- To gain better visibility into cloud assets, work with your cloud providers to conduct the vulnerability testing and monitoring you need, and ask them to provide you with the results.
“The big challenge is how to make assets visible to the IT security team so that they can monitor and secure them.”
As chief information security officer (CISO) of the UK-based Unipart Group, a global enterprise that provides manufacturing, logistics, and consultancy services, Paul Heffernan likens old-world IT security to castle defenses. “You put up strong walls and big doors, and you keep all your valuable stuff inside where it’s easy to find. But with modern computer systems and the way business uses them, the castle doesn’t work anymore,” he says.