Intelligent CISO Issue 70 | Page 73

end-point

ANALYSIS applications can give them , fails to see how rapidly this advantage can be eroded when issues occur . Security is treated as an afterthought rather than an essential component and security teams operate in relative isolation from other IT teams responsible for developing and maintaining applications . Such fragmented structures and working practices mean ITOps and security teams really only collaborate when a potential issue is identified – very much after Pandora ’ s box has already been opened .
The majority of technologists admitted that they often end up operating in ‘ security limbo ’ because they don ’ t know what to focus on and prioritise .
Security teams are only brought in at the very end of the application development pipeline for fear that taking time to consider the security implications might slow down release velocity .
Because of this archaic approach , many security teams today have limited visibility into Kubernetes environments , making it challenging to identify and address vulnerabilities . This is further complicated by the fact that current security solutions work well in silos but not together . Consequently , technologists struggle to get a comprehensive view of their organisation ’ s security posture . Teams are being bombarded with alerts from across the application landscape but are finding it hard to cut through the noise to understand the risk level of security issues . As a result , technologists have no way of telling which security issues pose the greatest threat to their organisations and their customers and employees .
In the modern enterprise a perfect storm is quietly brewing – a constantly evolving and ever more threatening risk landscape , a shortage of skills and
Joe Byrne , CTO Advisor , Cisco AppDynamics
WWW . INTELLIGENTCISO . COM 73