Security News > 2021 > January > Vulnerability management isn’t working for cloud security: Here’s how to do it right

So how do we solve this problem? It begins with a better vulnerability management system, a refocused commitment to cloud application security best practices and a realignment of our current security posture with the specific requirements of the cloud.
Vulnerability assessments are conducted periodically to evaluate the existing security posture and help inform any necessary changes to the vulnerability management action plan.
Scanning is perhaps the best-known vulnerability management tool, as it plays a high-profile role in cloud and hybrid cloud security.
Unlike for traditional vulnerability management tools, to BAS platforms the dynamism of the cloud presents little difficulty.
For these reasons, organizations seeking to modernize their vulnerability management processes may find deploying a BAS solution to be one of the fastest and most effective measures for improving cloud security.
If we are ever going to make high-profile cloud security breaches a rarity, it's imperative to create vulnerability management processes that reflect the actual challenges organizations face.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/KOt8UwCvDfI/
Related news
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- Why multi-cloud security needs a fresh approach to stay resilient (source)
- Cloud security gains overshadowed by soaring storage fees (source)
- Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security (source)
- Google to purchase Wiz for $32 billion in cloud security play (source)
- Cloud security explained: What’s left exposed? (source)
- Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed (source)
- How CISOs can balance security and business agility in the cloud (source)
- Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability (source)