Podcast: Play in new window | Download
Subscribe: Apple Podcasts | RSS
TechSpective Podcast Episode 117
“You can’t protect what you can’t see.”
The first time someone said that, I am sure it was very profound. It is an obvious statement, but also very powerful in the context of cybersecurity. If you aren’t even aware of the hardware assets connected to your network, or the software applications they are running, how can you possibly be aware of any vulnerabilities or weaknesses they may contain, and how could you take meaningful steps to reduce your exposure to risk.
Short answer: You can’t.
That is why the mantra “You can’t protect what you can’t see” remains powerful despite being obvious, and even as it has attained buzzword hype status for cybersecurity vendors. Everyone claims to provide “complete” or “comprehensive” visibility at this point. However, there is another piece of the puzzle that is essential: context.
The founder and CEO of JupiterOne, Erkang Zheng, shares his thoughts on the importance of context. Visibility is important, but what is equally–or more–crucial is having context to go with the visibility. Knowing all of the hardware and software assets connected to your network–or even that your hardware and software interacts with beyond your network–is not very helpful if you don’t also understand what those assets are doing and why, and how a compromise of those assets could impact your organization.
Check out the full episode for more on visibility and context for cybersecurity. Zheng and I also talk about the unique and innovative “Data Heist” events JupiterOne has been hosting around the country. The podcast itself is audio-only, but the video of our conversation is also available on YouTube if you prefer:
Please ask questions and share your thoughts on the topic in the comments below. Also, please subscribe to the TechSpective Podcast through your favorite podcast platform and share the podcast with your peers and friends.
If you enjoy the podcast, I would also be grateful if you could take 2 minutes to rate and review the podcast on iTunes or wherever you listen.
- Navigating the Future of Secure Code Signing and Cryptography - December 20, 2024
- The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce - December 20, 2024
- Exploring the Evolution of Cybersecurity Marketing - December 18, 2024