You Can Not Secure What You Can Not See

by

"The future of application development and infrastructure is in public clouds — and for many organizations, it's not just the future; it's today. Securing data, apps, and services in this new environment is critical for enterprises to defend against breaches, data exfiltration, and the resulting economic losses." -- Praveen Patnala, The Role of Visibility in Securing Cloud Application

Praveen Patnala, from Valtix, says out loud what many operations and engineering teams are concerned about: the security game has changed as companies move to the cloud. The main focus of Praveen's article is to highlight that old ways of doing business are no longer viable when it comes to securing the new model of  cloud native infrastructure. 

Keeping track of cyber assets has become an impossible task unless you utilize an automated solution for constant discovery and monitoring of those assets. As Praveen says, "Public clouds don't have a defined perimeter. Every single resource can be exposed to the Internet with a single click - an open security group rule or an ACL, an open route table entry, a public IP address attached to an interface, or some combination of these." All of your cyber assets are at risk without constant visibility and monitoring.

We fully support initiatives that work towards securing a cloud native future. We couldn't agree more with the premise of creating more visibility of all of you cyber assets within cloud native applications, including discover of endpoints, remote or external APIs, vulnerable components, compliance controls, etc. Thanks, Praveen, for the thoughtful article.

You can read The Role of Visibility in Securing Cloud Application on the Dark Reading site.

Additional Resources

 

Mark Miller
Mark Miller

Mark Miller speaks and writes extensively on DevSecOps and Cybersecurity. He has published 9 books, including "Modern Cybersecurity: Tales from the Near-Distant Future"

Keep Reading

Proactive IAM Security: Transforming Identity Security with Actionable Insights | Okta Integration with JupiterOne
December 19, 2024
Blog
Unlocking Proactive Security: How Okta and JupiterOne Elevate IAM Insights

Unlock proactive IAM security with Okta and JupiterOne, gaining real-time insights, enforcing least privilege, and reducing risks in dynamic cloud environments.

Transitioning from Vulnerability Management to Exposure Management | JupiterOne
December 13, 2024
Blog
Transitioning from Vulnerability Management to Exposure Management with JupiterOne

Explore Gartner's latest report on Exposure Management and learn how your organization can prioritize vulnerabilities and minimize exposures.

The Ultimate CAASM Guide for 2025 | JupiterOne
November 20, 2024
Blog
The Ultimate CAASM Guide for 2025

Discover how Cyber Asset Attack Surface Management (CAASM) is providing enhanced visibility of internal and external assets in 2025.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.