One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 1552699
Date de publication 2020-02-19 12:44:00 (vue: 2020-02-20 00:00:05)
Titre BrandPost: Securing your Cloud Workloads in Runtime: Why Pre-Runtime Scans Aren\'t Enough
Texte Enterprises that apply a security strategy to their cloud workloads often rely on security checks pre-runtime. In most cases, they scan for vulnerabilities within their code or containers before deploying their cloud workloads into production. However, in runtime - when actual cyber attacks can occur - organizations are left completely blind. In my discussions with CISOs during the last year I was surprised to hear that, despite having hundreds or even thousands of cloud servers, security teams lack visibility into what code is actually running inside their production environment. These teams believe that what's running is the software they intentionally deployed during the CI/CD process. However, they aren't certain.Having no visibility in runtime is problematic. If an attacker wants to steal your credentials or exploit a vulnerability - in any kind of attack vector - a cyber attack is almost always the result of malicious code or commands running in your servers.While pre-runtime security vulnerability checks are effective to some extent, they are not sufficient enough to cope with modern cyber threats, which don't necessarily rely on a known vulnerability. It's time for organizations to gain visibility and control over the code that is running in their cloud workloads. By identifying and terminating the malicious code running in memory, they will be able to detect the vast majority of cyber attacks on their cloud infrastructure.
Envoyé Oui
Condensat able actual actually almost always any apply are aren article attack attacker attacks before believe blind brandpost: can cases certain checks ci/cd cisos click cloud code commands completely containers control cope credentials cyber deployed deploying despite detect discussions don during effective enough enterprises environment even exploit extent full gain having hear here however hundreds identifying infrastructure inside intentionally kind known lack last left majority malicious memory modern most necessarily not occur often organizations over please pre problematic process production read rely result running runtime runtime: scan scans securing security servers software some steal strategy sufficient surprised teams terminating these thousands threats time vast vector visibility vulnerabilities vulnerability wants what when which why will within workloads year your
Tags Vulnerability
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: