TECH TALK
“We’re starting
to see a more
concerted focus
on improving
cybersecurity
across the
country, which
is critical as
the threat
landscape
continues to
evolve.”
Deployment) pipeline to ensure that
containers used by developers and
pushed into the live environment don’t
contain easily exploited flaws.
How has the BYOD phenomenon
affected how Tenable does business
and how are clients best protecting
their networks with BYOD becoming
increasingly dominant? BYOD is
dramatically changing how the
world does business - by 2017, half
of all employers will require BYOD
in the workplace. But the growth
of enterprise mobility and BYOD is
increasing threats to security and
privacy. How are organisations
managing the risks and rewards?
It is now expected that employees,
contractors, partners and others have
access to your network when they bring
their personal devices to work. Laptops,
tablets, smartphones, wearables, and
other devices demand connectivity, and
even help employees do their jobs more
efficiently. But this constant connectivity
also introduces security risks that
security teams must address.
Good security starts with great visibility.
Security teams need visibility into all
assets and devices, especially those that
can instantly connect and disconnect
from the corporate network, like mobile
84
INTELLIGENTCIO
Gavin Millard, Technical Director, Tenable
devices. It’s important that whatever
tool an organisation uses to manage
mobile security, it integrates with other
security solutions already in place,
and fits seamlessly into the overall
vulnerability management programme.
As networks become more open, and
the perimeters eroded by the necessity
of third party access or untrusted
devices, it’s critically important that the
vulnerabilities of the systems providing
access to corporate data are understood
and addressed in a timely manner.
“The perception
that cloud
is any more
vulnerable than
on-premises
solutions is a
myth.”
With increasing network speeds
and data traffic across networks,
are enterprises and governments
adequately investing in pre-emptive
security precautions and monitoring
tools? Is a lag with regulation in the
region enabling a lag with compliance?
Monitoring and reviewing the
effectiveness of security processes
and controls is critical to maintaining
security and compliance posture.
UAE government entities and others
identified as critical by NESA, are
required to do so as part of the
National Cyber Security Strategy.
Organisations that follow these
compliance requirements benefit from
greater protection of assets, and a
security-conscious culture, which is
critical for overcoming emerging security
challenges. Whilst compliance and
regulatory requirements are hugely
beneficial to those that follow them,
they often lag behind the current
threats faced. This means proactive
assessment of the environment against
emerging threats and attack vectors is
important to ensuring organisation stay
both compliant and secure. n
www.intelligentcio.com