iTnews
  • Home
  • Videos
  • Partner Content
Partner Content

Visibility and prioritisation are the key to effective network and infrastructure security

By Staff Writer
May 8 2024 9:00AM

Securing networks is paramount, mitigating risks amidst prevalent threats like zero-day vulnerabilities is essential.

Every facet of cybersecurity, from managing identity through to mitigating the risk of data loss has a link to the network and its supporting infrastructure.


Anthony Rees, the Field CTO at Lacework, says securing the organisational network is the highest priority facing security teams. By taking an ordered approach, organisations can mitigate the risk of their security corporate crown jewels being compromised.

“Cloud identity and zero-day vulnerabilities are the biggest risks I’m seeing today. Common vulnerabilities, like Log4J, WannaCry and HeartBleed can be very difficult to find and remediate,” Rees says.

The key, Rees explains, is to focus on the three areas of security hygiene, cloud posture and code security. Security hygiene, such as correctly configuring security and keeping systems up to date ties into cloud posture management and using best practices across cloud environments.

“Making sure that we haven't left ports open, configuring RDS databases correctly and using best of breed practices to ensure our cloud security posture is optimised are critical to protecting networks and infrastructure.”

Taking this journey is not without challenges. In his experience, Rees says there are three major blockers to getting network and infrastructure security right. Resourcing is a major issue with security experts in short supply. And many organisations find it difficult to prioritise threats within their organisation in the context of attack chains threat actors can exploit.

“The first step in dealing with these challenges is visibility,” says Rees. “You must identify everything in your environment and then prioritise anything that is internet facing. Then look for the current CVEs and any zero days that could potentially impact those applications and services.”

Application security is also critical. With so many services using open source and shared packages, code security is critical. By looking at those threats and risks in the context of critical workloads and ‘crown jewel’ data, organisations can direct resources where they will have the most impact. 

Understanding the environment and the risks it faces is the key to securing an organisation's network and infrastructure. Combining a robust risk mitigation plan with having contextual visibility on key workloads, will enable organisations to prioritise their resources to protect their most important assets.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
infrastructuresecuritylaceworknetworksecuritypartner contentstateofsecurity

Related Articles

  • LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing
  • AI is a force multiplier in the fight against cybercriminals AI is a force multiplier in the fight against cybercriminals
  • Securing your identity in the clouds Securing your identity in the clouds
  • IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

Partner Content

State of Security 2024
State of Security 2024
IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney
Partner Content IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney
Visibility and prioritisation are the key to effective network and infrastructure security
Partner Content Visibility and prioritisation are the key to effective network and infrastructure security
SASE can reduce vendor sprawl, minimise costs and enhance network security
Partner Content SASE can reduce vendor sprawl, minimise costs and enhance network security

Sponsored Whitepapers

Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Trust Imperative 4.0
Trust Imperative 4.0
Centralized Remote Connectivity for State & Local Government
Centralized Remote Connectivity for State & Local Government
Global Employee Experience Trends Report
Global Employee Experience Trends Report
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

AI is a force multiplier in the fight against cybercriminals

AI is a force multiplier in the fight against cybercriminals

SASE can reduce vendor sprawl, minimise costs and enhance network security

SASE can reduce vendor sprawl, minimise costs and enhance network security

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

Digital Nation

State of Security 2023
State of Security 2023
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.