Tuesday, January 20, 2026
HomeTechnologyThe way forward for cybersecurity in hybrid cloud environments

The way forward for cybersecurity in hybrid cloud environments


An interview with Gigamon’s Chief Security Officer, Chaim Mazar Chaim Mazar • June 12, 2024

The future of cybersecurity in hybrid cloud environments

Chief Information Security Officers (CISOs) face unprecedented challenges of their efforts to guard their organizations from a rising variety of more and more subtle cyber threats.

Reference: Live Webinar | Special Offer! Advanced Intrusion Prevention and Investigation for Secure Mail Gateways


To assist you handle threat and enhance cybersecurity, particularly in hybrid cloud environments, we interviewed Chaim Mazal, Chief Security Officer at Gigamon, to be taught extra concerning the complexities of securing hybrid cloud environments, the significance of visibility, and the way CISOs and safety leaders are maintaining with evolving cybersecurity necessities.


Q: What is the largest problem going through CISOs today?


Chaim Mazal: The complexity of the environments we have to shield has elevated considerably. We are not coping with a single knowledge heart or cloud atmosphere, however with a number of cloud environments, hybrid setups, and on-premise infrastructure. This complexity makes complete safety extraordinarily difficult. Additionally, laws resembling GDPR and CCPA add complexity and the regulatory atmosphere is turning into extra stringent. Finally, the cybersecurity expertise scarcity is one other hurdle to beat. There is a scarcity of certified professionals to fill the ever-growing variety of job openings.


Q: How does Gigamon tackle these challenges?


Chaim Mazal: At Gigamon, we give attention to offering complete visibility, or “deep observability,” throughout all environments – on-premise, cloud, and hybrid. This deep visibility helps our prospects higher perceive their atmosphere and determine potential threats early. We effectively feed network-derived intelligence to varied safety instruments, offering a holistic view whereas making the combination course of seamless and environment friendly. This method reduces complexity and improves the general safety posture of our prospects.


Q: What function does automation play in enhancing cybersecurity?


Chaim Mazal: Automation is crucial in managing the huge quantity of information we course of daily. Automation permits us to maintain up with as we speak’s tempo of change in cybersecurity. Automation automates the preliminary triage of alerts, decreasing the variety of false positives and permitting analysts to give attention to actual threats. This not solely will increase effectivity but in addition improves the accuracy of risk detection and response.

Q: What are some important preventative measures a CISO can take to remain forward of breaches?

Chaim Mazal: Continuous risk modeling is vital. Organizations ought to have a devoted staff that repeatedly maps the risk panorama throughout their infrastructure, together with each manufacturing and company environments. It is crucial to commonly replace the risk mannequin and carry out steady penetration testing. It can also be necessary to have a sturdy incident response plan in place to reply in actual time when an incident happens.

Q: How can organizations guarantee their safety practices sustain with fast technological change?

Chaim Mazal: Investing in your safety staff is step one. Security shouldn’t be an afterthought in funds allocations. Providing the staff with the appropriate instruments and sources is crucial. Organizations also needs to be certain that safety operations are built-in with growth groups and safety is constructed into the event lifecycle. Additionally, toolsets must be continually evaluated and up to date to maintain up with expertise developments.

Q: What tendencies and applied sciences do you assume will form the way forward for cybersecurity?

Chaim Mazal: Artificial intelligence (AI) and machine studying (ML) might be a sport changer. The sheer quantity of information that have to be processed makes using AI and ML a necessity for real-time determination making. Additionally, as organizations transfer to hybrid cloud environments, a zero belief community structure is turning into extra necessary. This method ensures that knowledge stays safe no matter the place it’s saved.

Q: Why is visibility into encrypted visitors necessary and the way does Gigamon improve that visibility?

Chaim Mazal: Visibility into encrypted visitors is essential as a result of a lot of the malware hides in encrypted visitors as we speak. Traditional safety instruments usually lack the power to successfully examine encrypted visitors, leaving organizations weak. Gigamon Precryption™ expertise offers clear visibility into encrypted visitors throughout digital and containerized workloads, enabling superior risk detection and response, which is crucial for sustaining a sturdy safety posture in hybrid cloud environments.

Q: How can organizations profit from integrating intelligence from their community with conventional safety instruments?

Chaim Mazal: Intelligence gained from the community offers real-time perception into community visitors patterns, which is crucial for detecting anomalies and potential threats. When built-in with conventional safety instruments, this intelligence improves risk detection by offering a complete view of the community. This allows organizations to detect and mitigate threats that could be missed by conventional instruments, enhancing general safety effectiveness. This integration allows organizations to have deep visibility into all knowledge in movement throughout hybrid cloud environments.

Q: What strategic recommendation would you give to CISOs seeking to enhance their risk detection capabilities?

Chaim Mazal: CISOs should prioritize detailed monitoring of community visitors, encrypted or not. Investing in superior risk detection instruments that leverage AI and ML can also be necessary. Additionally, fostering a tradition of steady studying and staying updated with the newest risk intelligence will make an enormous distinction. Collaboration and data sharing within the cybersecurity neighborhood can present beneficial insights and techniques to remain forward of potential threats.

Q: How ought to organizations go about implementing a Zero Trust structure?

Chaim Mazal: Implementing a Zero Trust structure requires cautious planning and a phased method. Organizations ought to begin by segmenting their networks and implementing strict entry controls. Continuous monitoring and validation of all community exercise is essential. Actionable steps embrace integrating endpoint safety instruments and making certain safety measures are user-friendly to keep away from operational disruptions. Overcoming obstacles to Zero Trust additionally requires addressing cultural resistance and offering correct coaching to make sure a easy transition.

Q: How is the CISO function evolving?

Chaim Mazal: CISOs have gotten extra strategic. CISOs have elevated duties in threat administration and speaking with the board. CISOs should successfully clarify these cybersecurity dangers and techniques to government administration and the board. Having a direct reporting line to the CEO and board of administrators enhances communication and permits for higher oversight. This evolution is crucial to align cybersecurity efforts with general enterprise objectives and guarantee a proactive safety posture.

Q: How can organizations stability safety and privateness considerations whereas inspecting encrypted visitors?

Chaim Mazal: Implementing strong knowledge anonymization strategies and making certain compliance with regulatory requirements may also help organizations higher stability safety and privateness considerations. Organizations ought to give attention to abstracting particular person identities and analyzing behavioral patterns. Transparency in how knowledge is dealt with and making certain that privateness safety rules are adhered to are key. Ongoing dialogue with stakeholders, together with privateness advocates, can even assist organizations enhance how finest to keep up this stability.

Q: What sensible impression does the brand new decryption expertise have on day-to-day cybersecurity work?

Chaim Mazal: New decryption applied sciences simplify the method of gaining visibility into encrypted visitors, which is crucial for risk detection and response. These applied sciences cut back the guide work and overhead related to conventional decryption strategies and make it simpler for safety groups to observe encrypted visitors in actual time. Increased visibility means threats could be recognized and mitigated extra rapidly, in the end strengthening a company’s safety posture.

Q: What are some frequent misconceptions about risk safety in hybrid cloud environments?

Chaim Mazal: One frequent false impression is that logs alone are sufficient for risk detection and prevention. Logs are necessary, however they don’t seem to be full and could be tampered with. Relying solely on logs could make your group weak. A simpler method is to mix log knowledge with packet-level community knowledge to create a complete view. We name this mix “deep observability.” This offers a extra correct image of community exercise and helps validate the integrity of the information.

Q: What recommendation would you give to CISOs going through the problem of securing hybrid cloud environments?

Chaim Mazal: CISOs ought to give attention to gaining complete visibility or detailed observability throughout all cloud and on-premise environments. Implementing superior risk detection instruments and making certain seamless integration of safety instruments will assist. Continuous risk modelling and common penetration testing will even assist determine and mitigate vulnerabilities. Finally, fostering a tradition of safety consciousness and investing in ongoing safety coaching is crucial to remain forward of rising threats.

Mazal emphasised that visibility, automation, and proactive measures are key to enhancing cybersecurity in hybrid cloud environments. As threats evolve, CISOs and safety leaders should stay vigilant and adaptable to successfully fight more and more subtle cyber threats.



Source hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular