• Home
  • >
  • DevOps News
  • >
  • Why Third-Party Security Adoption Must Get Better – InApps Technology 2022

Why Third-Party Security Adoption Must Get Better – InApps Technology is an article under the topic Devops Many of you are most interested in today !! Today, let’s InApps.net learn Why Third-Party Security Adoption Must Get Better – InApps Technology in today’s post !

Read more about Why Third-Party Security Adoption Must Get Better – InApps Technology at Wikipedia



You can find content about Why Third-Party Security Adoption Must Get Better – InApps Technology from the Wikipedia website

Prisma Cloud from Palo Alto Networks sponsored this podcast.

Major exploits such as the Target and Equifax hacks made headlines a few years ago. But these infamous attacks have not necessarily served as a wake up call for many, if not most, organizations. They lack the security tools, processes and culture required to properly protect their data, Chenxi Wang, Ph.D., managing general partner of Rain Capital, said.

“Everybody read about those headlines, but translating that into the work [organizations] do today, I think there’s still a gap,” Wang said. “As security industry professionals — myself included — we need to reach out more to the adjacent community and especially with dev these days. I mean software is eating the world and dev is the one driving software, so we need to work with dev to make it happen.”

In this edition of InApps Technology Makers podcast hosted by Alex Williams, founder and publisher of InApps Technology, Wang spoke about these and other third-party security trends. The podcast was recorded in anticipation of The State of Cloud Native Security virtual summit to take place on June 24.


Chenxi Wang, Ph.D. Why Third-Party Security Adoption Has to Get Better

Also available on Apple Podcasts, Google Podcasts, Overcast, PlayerFM, Pocket Casts, Spotify, Stitcher, TuneIn

Read More:   Update With Watson, IBM Builds a Platform for Intelligent Assistance

Like the Target and Equifax breaches, government-sponsored attacks also make headlines. According the U.S Justice Department, for example, a North Korean team of hackers allegedly orchestrated the WannaCry exploit for ransomware.

Regardless of their origins, security policies, and the resulting tools adopted, must all take into account that the vast majority of attacks are financially motivated. “By and large hacking follows a trail of money,” Wang said. “They want to hit places and systems where there is the most valuable data.”

Data stored on the cloud is often seen as a potential goldmine among those seeking vulnerabilities for access to sensitive and often compromising data to broker or exploit as organizations increasingly make the shift to the cloud. At the same time, DevOps and DevSecOps teams often lack the toolsets they need to lock down what is, for many organizations, a new universe. Difficulties in monitoring cloud logs is one example of challenges they face when trying to manage security on cloud services.

“I can’t tell you how many security professionals have been telling me they’re drowning in those cloud logs and they need something to help them to aggregate and make sense of and to analyze and visualize them,” Wang said. “I think that’s one gap that the cloud service providers are not providing today.”

The tools DevOps and DevSecOps teams require must also be able to encompass DevOps’ increased reliance and adoption of open source tools — and that can pose challenges.

“Open source tools are easy to manipulate and a lot of developers like them, but for enterprise security to do enterprise security tasks, they often don’t provide the right way to analyze data or to integrate with other tools easily so you have to build that,” Wang said. “So, there is a place I think in Infosec for someone to step in and say, ‘okay, I’m going to come manage your open source tools that have security implications and give you that enterprise layer of control on top of those tools.’”

Read More:   Does Expo Support React Native Web?

Ultimately, security must also address protecting its victims. In that respect, security policies must have an “altruistic aspect,” Wang said. “We are protecting consumers’ financial data, and on the other end of the wires consumers are 80-year-old guys who have bank accounts,” Wang said. “I like that aspect of being able to provide protection. to individual consumers and users.”

Join Prisma Cloud by Palo Alto Networks June 24 at 9:00 AM PDT at The State of Cloud Native Security virtual summit for a full discussion of the “The State of Cloud Native Security” report and other topics relevant to your organization’s digital journey. The summit will feature a panel session hosted by InApps Technology’s Founder and Editor-in-Chief Alex Williams, with security thought leaders from Accenture and Prisma Cloud by Palo Alto Networks.

Feature Image by Juan Diego Guzmán Hijuelos from Pixabay.



Source: InApps.net

Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      [cf7sr-simple-recaptcha]

      Success. Downloading...