{"id":2781,"date":"2023-05-01T17:37:00","date_gmt":"2023-05-01T17:37:00","guid":{"rendered":"https:\/\/www.clouddatainsights.com\/?page_id=2781"},"modified":"2023-12-12T16:09:23","modified_gmt":"2023-12-12T16:09:23","slug":"critical-steps-to-secure-your-cloud-based-apps-and-infrastructure","status":"publish","type":"page","link":"https:\/\/www.clouddatainsights.com\/critical-steps-to-secure-your-cloud-based-apps-and-infrastructure\/","title":{"rendered":"Critical Steps to Secure Your Cloud-Based Apps and Infrastructure"},"content":{"rendered":"\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Sponsored by Sumo Logic<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\" style=\"font-size:50px\"><strong>Critical Steps to Secure Your Cloud-Based Apps and Infrastructure<\/strong><\/h1>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"position:relative;overflow:hidden;padding-bottom:56.25%\"><iframe loading=\"lazy\" src=\"https:\/\/cdn.jwplayer.com\/players\/Hy5breNJ-aBObdqyY.html\" width=\"100%\" height=\"100%\" frameborder=\"0\" scrolling=\"auto\" title=\"Criticalstepswoverlays3\" style=\"position:absolute;\" allowfullscreen><\/iframe><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Organizations run into many obstacles today when trying to secure modern apps and infrastructures. In this video, RTInsights interviews Paul Tobia, senior product manager at Sumo Logic, to discuss security challenges in cloud environments, how traditional security approaches break down, and steps organizations can take to improve security. <\/p>\n\n\n\n<p>Tobia also discussed the need for a platform that brings all the relevant logging and monitoring data in one place so that it can be analyzed to spot potential problems and troubleshoot them before they impact an organization\u2019s security posture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Transcript<\/h3>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> Hi. Welcome to today’s webcast. Part of our discussions are ongoing series of discussions here at RTInsights with leaders and thought leaders from across the technology world. I’m Joe<br>McKendrick, your host and contributor to RTInsights and I’m really pleased today to be speaking with Paul Tobia, Senior Product Manager at Sumo Logic.<\/p>\n\n\n\n<p>I think it’s safe to say that Paul is very passionate about information security and perhaps ranks as one of the most knowledgeable people around on this topic. He has been involved in information security for 20 years now developing programs, safeguarding critical information for various companies. His career spans information security positions with Scripps Health, Symantec, and Sharp Health. And he is also very active with the San Diego Chief of Information Security Officer community. <\/p>\n\n\n\n<p>Paul, welcome. Happy to have you here with us.<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> Thanks, Joe. Appreciate the opportunity.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> Okay. Let’s start talking information security, a very important topic. Paul, what do people, especially business leaders and the technology leaders as well, tend to miss when it comes to application information security these days? We hear a lot about it, but, you know, it’s still a big issue.<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> I think that specifically when we’re talking about application information security and, as you mentioned, my background, I’ve been doing computer security, information security, cyber security for a long time now. To keep up with the latest advances in how computing occurs, to make sure that as technology changes that the information security programs or the cyber security programs keep up with that technology is a tough thing to do, and it’s a critical thing to do. But it’s where I enjoy…, want to put my mind towards. <\/p>\n\n\n\n<p>I think the major challenge that we’re looking at here is that computing itself is changing. The way that the rise of the developers, the rise of the way that computing occurs across the industry changes some fundamental things about information security and cyber security. But when you get down to it, it is still the same thing it was 20, 25 years ago. <\/p>\n\n\n\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-af77d801-80b3-4f09-ad96-72ff51226f8b\"><span class=\"hs-cta-node hs-cta-af77d801-80b3-4f09-ad96-72ff51226f8b\" id=\"hs-cta-af77d801-80b3-4f09-ad96-72ff51226f8b\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/8019034\/af77d801-80b3-4f09-ad96-72ff51226f8b\" ><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-af77d801-80b3-4f09-ad96-72ff51226f8b\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/8019034\/af77d801-80b3-4f09-ad96-72ff51226f8b.png\" alt=\"Why end-to-end visibility is critical to secure your apps in a serverless world Read Now on SumoLogic.com\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(8019034, 'af77d801-80b3-4f09-ad96-72ff51226f8b', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n\n\n\n<p>You still have to identify, protect, detect, respond, and recover. It’s just with new technology and new<br>methodologies and new players in the space, as well. So the things change, but the fundamentals are still the same around information security.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> Okay, fantastic. And of course within recent years, everybody’s gone to the Cloud. And I think there’s a kind of an assumption out there that the Cloud provider’s gonna handle a lot of this security. In essence people may be feeling that they’re able to outsource some of their security concerns to the Cloud, and this, this is probably an erroneous assumption. Paul, what should organizations do? What steps should they take to secure their Cloud-based applications, data, and infrastructure?<\/p>\n\n\n\n<p><strong>Paul Tobia<\/strong>: I think that, um, you’re right. There is, there is certain responsibilities that the Cloud providers will do for you. Um, but there’s a limitation to what they, to what they accomplish. They set the table, they provide the table, they provide a certain level of the infrastructure that you’re running on, so there’s things you don’t have to\u2026 You don’t have to run a data center, you don’t have to worry about physical security to the hardware, things like that, those are what the Cloud providers are gonna, are, are going to give you as part of that service. But everything else on top of that is still your responsibility. So there, there’s certain, there’s shared responsibility models that each of the Cloud providers have. So it doesn’t abdicate (laughs) the responsibility of the individual’s security providers or the organization’s security providers. It’s still those same challenges that we faced a, a long time ago.<\/p>\n\n\n\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-dedddab8-51ba-4bb3-948a-b21ce7421b80\"><span class=\"hs-cta-node hs-cta-dedddab8-51ba-4bb3-948a-b21ce7421b80\" id=\"hs-cta-dedddab8-51ba-4bb3-948a-b21ce7421b80\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/8019034\/dedddab8-51ba-4bb3-948a-b21ce7421b80\" ><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dedddab8-51ba-4bb3-948a-b21ce7421b80\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/8019034\/dedddab8-51ba-4bb3-948a-b21ce7421b80.png\" alt=\"The ultimate race condition: Securing open source infrastructure Read Now on SumoLogic.com\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(8019034, 'dedddab8-51ba-4bb3-948a-b21ce7421b80', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n\n\n\n<p>Uh, again, I go back to that identify, protect, detect, respond, and recover. What, what is my computing<br>environment? What are the threats to that computing environment? What’s the level of risk that I’m willing to take, um, and what are the things that I can implement? What are the protections and processes, people, process, and technology that I can implement to reduce that security risk to a manageable level? And then how do I operate that on a, on a, on a day-to-day basis?<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> Great stuff, great stuff, but I’m sure there’s, uh, you know, obstacles be it organizational, technical that obstacle, that organizations face in achieving this. You know, can you discuss, you know, what organizations tend to run up against, uh, the obstacles and challenges, uh, and how to overcome them?<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> Absolutely. Um, I mean, first and foremost is that the rate of technology, the rate of change of the methodologies of getting computing, of getting these absent services out to the customers, um, is<br>accelerating, continues to accelerate. Um, less than 20 years, we’ve gone from basic virtualization and VMs all the way to the leading edge of, like, no code applications or low code applications. Um, that doesn’t necessarily\u2026 You don’t see that’s, you don’t see that slowing down. But that is also just the leading edge. So the, the distribution of these new technologies is uneven, as well. Not everybody is running on a Cloud service. Not everybody is running through a, through a, through a Cloud provider. There’s still plenty of on-prem capabilities that are out there.<\/p>\n\n\n\n<p>Um, things change in the computing environment, as well. Um, before the, before the COVID pandemic, um, computing was a lot more centralized. And now, there’s a lot more remote work, things like that, which adds new challenges. So new technology is a huge obstacle, um, in making sure that you understand that new technology and those new capabilities. Um, there’s really, because of that acceleration of technology, there’s a lack of mature-specific security standards around these technologies. So a lot of it’s being provided by the vendors and the open source, uh, communities that build up around these infrastructures on how to manage or how to, how to defend against them.<\/p>\n\n\n\n<p>Another one that I talk about is just the scale of computing nowadays. So now that you’re not as limited from a physical plant perspective, you just buy the services, buy computing as you need it. Um, the capability to spread is huge, um, not just from a volumetric scale, not just that you can be running multiple and multiple instances of databases, services, all of that, but also the leaning towards that microservices architecture, right? We’ve moved away from the three-tier app, uh, end user app database, uh, paradigm, and now you’ve got potentially hundreds of individual microservices all talking via API to each other to provide an application to it. So you’re not just looking at large scales in terms of running hundreds of instances across multiple regions and globally availability, but you’re also talking about instead of managing, your app consists of a whole bunch more individual components that you’re looking at.<\/p>\n\n\n\n<p>With, with that level of scale, then comes the manageability of it, which becomes automated. So you’re<br>talking about the as software, whether it’s infrastructure as software, platform as software, that the<br>idea that you’re scripting and you’re managing your, your environments, you’re managing the stack<br>through code, you’re managing, uh, all of that through that automation because you can’t physically<br>from a human standpoint manage all of those things like we manage servers, like we managed servers<br>back in the day.<\/p>\n\n\n\n<p>Um, that leads to kind of tools sprawl. So there’s a whole bunch of different management capabilities and security capabilities that are out there. There’s some consolidation that’s going towards the providers, so the providers are kind of consolidating a lot of security services underneath them. But there’s plenty of security vendors out there, and especially as you get towards those leading edges of how you’re managing your Cloud or your application-based security. And then as we all learned back in Log4j, supply chain is a big issues, as well. So what are those services when we talked about that shared responsibility? Um, there’s shared responsibility, but then there’s also the libraries that you’re running, the systems that, code that you’re taking in to make part of your platform. Do you understand what that code is, do you understand the vulnerabilities for that, for that code and where it, where it lives within your app and your services, as well? So there’s a ton of obstacles out there. There’s a ton of new stuff, right, for, for security practitioners to manage.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> Oh, yeah. And I love the fact that you mentioned low code and no code. I mean, that’s something we’re seeing a lot of. It was a lot of excitement, a lot of hype around it. You know, the citizen developers can do what they want and not, not have to go to IT for everything they need, which is great in practice, but I don’t think enough is being said about the security implications, you know, the, the guardrails that are needed to, uh, you know, (laughs) keep things from, uh, going askew.<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> And, and that always comes back to it. That’s why I kinda, that’s why I kind of open with the basics of security, right. E- even, even if with cutting edge technologies, even with citizen developers out there, open source systems, things like that, the job of the CESO is still the same as it was 25 years ago. It’s to manage risk for their organization, it’s to be able to, you know, have a security program in place that<br>identifies what your computing environment it is, that you put in the appropriate protections, you detect the bad guys, you r- you respond to those, and you recover back to normalcy after, after the attacks happen. So that, that’s still the same whether you’re, w- no matter what computing technologies you’re working on. It’s just that the environment and the tools and the players all, all continually change, which is fun, which is why you could make a career out of it, right, and why, why I’m not bored after 25 years of doing this stuff. (laughs)<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> (laughs) Yeah, every week, a new thing to, uh, crops up, right?<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> That’s right.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> And, uh, you know, and, and, and you’re talking a bit about this, Paul, already, but, uh, you know, the, the shortcomings, uh, you know, of the traditional security approaches, you know, with all these new environments, Cloud, uh, APIs, uh, low code, no code. Um, you know, a lot of stuff cropping up. Uh, traditional solutions that are still out, you know, what, what, what’s, what’s the issue and, uh, how can, how, how do we need to address that?<\/p>\n\n\n\n<p><strong>Paul Tobia: <\/strong>Um, the, the thing is, the thing that we see, um, is that bringing that information together, making that information useful. So whether it’s the applications itself, the infrastructure that they have, the services that you buy on top of it, that’s all providing data. Um, but being able to consolidate that data, being able to, being able to pull the signal out of that data and understanding and feed it back into your security program so that you understand that you can do that identify, protect, detect, respond, recover, that you can understand what are the threats that are up against your environment, that no matter what part of the application development process that you’re in, whether you’re building, deploying, or running systems, that you’ve got visibility into what’s going on in your environment and you have visibility to the potential attacks that are occurring and the realized attacks that are occurring.<\/p>\n\n\n\n<p>Um, that kind of speed, that capability to live in both worlds or multiple worlds, that ability to have the tool set that, because evidation is still happening. So as, as you mentioned, right, as those, as, as those, um, technologies get more and more prevalent and get deployed, then the services on top of them, the vendors and the innovation come on top of that, and they provide the additional management and security services that are on top of that.<\/p>\n\n\n\n<p>So you can get a tool, you can get, like, a Cloud security posture management that goes out there and looks at your Cloud, uh, deployed environment, your Cloud infrastructure environment and sets it against certain standards and says, “Here’s where you’ve got policy issues. Here’s, here’s the things that you can do. Here’s the things that you can’t do.” But how do you take that information and synthesize it, put it into your security program to do that risk management that you’re, that you’re responsible for doing? So it’s that speed of response, it’s the capability to keep up with that technology, it’s the capability to be neutral around it. Can you pull in this digital exhaust and this information that’s coming from multiple service providers? You may not just be locked into a singular one of the big three Cloud providers. And can you, can you provide a view towards your end users, as well? Can you provide a view towards your on-prem stuff, as well?<\/p>\n\n\n\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-5b6b7595-0629-4b29-90cc-9277776bf61f\"><span class=\"hs-cta-node hs-cta-5b6b7595-0629-4b29-90cc-9277776bf61f\" id=\"hs-cta-5b6b7595-0629-4b29-90cc-9277776bf61f\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/8019034\/5b6b7595-0629-4b29-90cc-9277776bf61f\" ><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-5b6b7595-0629-4b29-90cc-9277776bf61f\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/8019034\/5b6b7595-0629-4b29-90cc-9277776bf61f.png\" alt=\"The Forrester Wave: Security Analytics Platforms, Q4 2022 Download Now on SumoLogic.com\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(8019034, '5b6b7595-0629-4b29-90cc-9277776bf61f', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n\n\n\n<p>Um, so taking those individual sources and pulling them together into a single, a single view, I believe, is very important. Um, the other thing is when we talk about the people who are involved in security now, so the rise of the developers and the responsibility that they have now, which was, a lot of it was done by traditional IT, that’s also coming into the security realm, as well. So how do you teach developers to be security practitioners, and how do you teach security practitioners to understand the development environment? One of the examples that I use is that if you run a secur- uh, you know, the, the corporate IT or the CESO runs a vulnerability scanner against your environment, and they find out in a modern app security environment that the java version is incompatible, right? They need, there needs to be a security update for a java version at this one IP address.<\/p>\n\n\n\n<p>What does that mean from a developer’s standpoint, right? What’s the, what’s the, what’s the ephemeral container that was lying underneath there that was running on a particular pod that was responsible for a particular service that was pulled from a particular repository where the actual java code was, was submitted and put in there, right? So you give them an end point of that, of that IP address, you hand that to the developer, and the developer’s gonna spend four or five hours, better part of the day just hunting down where to actually make that change. So, so having that communication and providing the value out of that data I think is pretty critical.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> And you raise a good point there, as well. Security needs to be, uh, a concern across the enterprise. You know, uh, in days gone by, larger enterprises had security teams that did nothing but worry about security and nobody else had to worry about it at the time. Um, you know, now, it’s developers, even the database administrators, the data engineers, uh, all folks across the chain, right, that really should be involved in the process and understand what’s going on, right, with security.<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> Security continues to go up the stack, right? It doesn’t just start at the physical layer. It gets in the, you know, in the network layer. It gets all the way up into the application side of things. So even if you go beyond the run time stuff\u2026 Some of the things that we talked about with the java thing where, where you’re talking about the, the mitigation to, to a security threat or a vulnerability is not a network change, it’s not a firewall port, it’s not a patch to be loaded. It’s, it’s actual changing of the code that happens way back at the repository, way back in the build phase before the build deploy run occurs. So making those connections and, and finding the places where you can reduce your risk, um, and speaking to the right people, accountability, all of those sorts of things, it’s just, um, more complex.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> And, Paul, we know, uh, you’re, you’re doing a lot of work in this area. Uh, Sumo Logic is doing a lot of work in this area. Can you talk about, um, you know, what, what you folks have, uh, underway and, uh, you know, what, what you have to offer in this regard?<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> Yeah. Um, so, so I think some of the advantages of, of Sumo Logic\u2026 So Sumo Logic at its core pulls in that, pulls in that information whether it’s from a security standpoint or an observability standpoint. So<br>it’s not just security use cases that, that Sumo does, but observability, as well. So we’ve already got<br>developers in our platform using our systems to manage that huge fleet of microservices or manage their kubernetes pods or manage their containers and repositories. And we also do the security side, as well. So we have a, a, a SIEM that’s out there, a SOAR capabilities within our, within our platform, too. And because we are neutral, we’re not, we take data from all of those data sources, all of those Cloud providers, all of those individual organizations who are innovating and providing their own security services and pulling all of that, pulling all of that data together, including the on-prem stuff, we exist in a Cloud where a Cloud-native service that we’ve got. So we can handle that scalability. Um, and since we are a Cloud-native service, we’re also very agile. We’re also very responsive to adding new information into the system and supporting new, supporting new data sources. Our SEIM supports a couple hundred, uh, different, different vendors and products that are, that are out there, and we add, we add more and more every week.<\/p>\n\n\n\n<p>So being able to pull all that information together into one place and then being able to do analytics on top of that, um, that’s the core of what our, what our platform does. But then there’s also the detection and response piece, the SEIM and the SOAR type, type features that we’ve got on there. And the advantage is, is that we treat data as data. So whether the information comes from a traditional three-tier application’s structured architecture or whether the information is coming from, you know, fully-orchestrated through Kubernetes modern app stack, we’re still going to be able to provide you the same analytics and detection tools to determine what’s going on in that environment to, and to make the right choices around what you need to respond to, what you need to recover from, what you need to protect, detect, et cetera, et cetera.<\/p>\n\n\n\n<p><strong>Joe Mckendrick<\/strong>: Wonderful, wonderful. And, Paul, uh, any final thoughts on, uh, security, you know? It’s, it’s something, uh, everybody needs to be concerned with, uh, you know, and, and, you know, we need to do a lot of education and, and in, in the market to, uh, help people understand what they need to do, um, how they need to work with Cloud and, and, and, and security takes on a whole different cast, you know, when you’re working with Cloud, as you’ve been telling us. You know, any final thoughts on what people should know in addition?<\/p>\n\n\n\n<p><strong>Paul Tobia<\/strong>: Yeah. That’s a great point, Joe. Right, it’s the people and the process. It’s not just the, it’s not just the technology. Um, there is, there’s a convergence here that’s happening. Security practitioners need to understand software better. We need to, we need to, uh, we need to think more like developers. And then developers are getting more responsibilities and accountabilities in security. So there’s, there’s these two areas that are kind of driving this innovation and driving where we’re going in terms of computing, and the capability to bring those two groups together and have them start working together as opposed to at odds to each other, I think is very exciting. Um, the capability to, to learn on the job and embrace something new, and, and to keep moving security in general forward is, is super exciting and, and stuff that gets me up in the morning and, uh, and (laughs), and, and moves me forward. So.<\/p>\n\n\n\n<p><strong>Joe Mckendrick:<\/strong> That’s good [inaudible 00:20:30]. It’s great to hear that you’re out there looking out for us (laughs). Thank you. Uh, Paul Tobia, uh, senior product manager for Sumo Logic, uh, great having you on with us today.<\/p>\n\n\n\n<p><strong>Paul Tobia:<\/strong> Thanks, Joe. Appreciate the opportunity.<\/p>\n\n\n\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-c2c3910b-1915-467d-a1f2-f3fe795b1838\"><span class=\"hs-cta-node hs-cta-c2c3910b-1915-467d-a1f2-f3fe795b1838\" id=\"hs-cta-c2c3910b-1915-467d-a1f2-f3fe795b1838\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/8019034\/c2c3910b-1915-467d-a1f2-f3fe795b1838\" ><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-c2c3910b-1915-467d-a1f2-f3fe795b1838\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/8019034\/c2c3910b-1915-467d-a1f2-f3fe795b1838.png\" alt=\"Empower every team to detect threats with Cloud Security Analytics Get Started Now on SumoLogic.com\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(8019034, 'c2c3910b-1915-467d-a1f2-f3fe795b1838', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n","protected":false},"excerpt":{"rendered":"<p>Sponsored by Sumo Logic Critical Steps to Secure Your Cloud-Based Apps and Infrastructure Organizations run into many obstacles today when trying to secure modern apps and infrastructures. In this video,… <a href=\"https:\/\/www.clouddatainsights.com\/critical-steps-to-secure-your-cloud-based-apps-and-infrastructure\/\" class=\"\" rel=\"bookmark\">Read More \u00bb<span class=\"screen-reader-text\">Critical Steps to Secure Your Cloud-Based Apps and Infrastructure<\/span><\/a><\/p>\n","protected":false},"author":42,"featured_media":2450,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","neve_meta_sidebar":"right","neve_meta_container":"contained","neve_meta_enable_content_width":"on","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"off","neve_meta_disable_footer":"","neve_meta_disable_title":"on","neve_meta_reading_time":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-2781","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"jetpack_sharing_enabled":true,"uagb_featured_image_src":{"full":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S.jpg",1000,750,false],"thumbnail":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-150x150.jpg",150,150,true],"medium":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-300x225.jpg",300,225,true],"medium_large":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-768x576.jpg",768,576,true],"large":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S.jpg",1000,750,false],"1536x1536":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S.jpg",1000,750,false],"2048x2048":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S.jpg",1000,750,false],"alm-thumbnail":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-150x150.jpg",150,150,true],"neve-blog":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-930x620.jpg",930,620,true],"rpwe-thumbnail":["https:\/\/www.clouddatainsights.com\/wp-content\/uploads\/2023\/03\/Depositphotos_22297813_S-45x45.jpg",45,45,true]},"uagb_author_info":{"display_name":"CDInsights Team","author_link":"https:\/\/www.clouddatainsights.com\/author\/cdinsights-team\/"},"uagb_comment_info":0,"uagb_excerpt":"Sponsored by Sumo Logic Critical Steps to Secure Your Cloud-Based Apps and Infrastructure Organizations run into many obstacles today when trying to secure modern apps and infrastructures. In this video,… Read More \u00bbCritical Steps to Secure Your Cloud-Based Apps and Infrastructure","_links":{"self":[{"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/pages\/2781"}],"collection":[{"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/comments?post=2781"}],"version-history":[{"count":24,"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/pages\/2781\/revisions"}],"predecessor-version":[{"id":4813,"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/pages\/2781\/revisions\/4813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/media\/2450"}],"wp:attachment":[{"href":"https:\/\/www.clouddatainsights.com\/wp-json\/wp\/v2\/media?parent=2781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}