CISO role in ASM could add runtime security, tokenization

<p>Attack surface management is a sprawling <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> field that aims to identify internal and external vulnerabilities, recommend countermeasures and watch for emerging threats. Enterprises looking to shore up the attack surface can deploy numerous <a href=”https://www.techtarget.com/searchsecurity/tip/What-is-attack-surface-management-and-why-is-it-necessary”>ASM</a> tools that scan, classify, remediate and monitor security issues, aligning with the CISO’s traditional role of assessing threats and implementing controls.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>But cybersecurity leaders might also consider emerging ASM aspects that promote more proactive security measures. For example, runtime security approaches protect applications and workloads while they are executing, allowing security personnel to immediately address issues that arise. Another example is <a href=”https://www.techtarget.com/searchsecurity/definition/tokenization”>tokenization</a>, a process that replaces sensitive data with a randomly generated identifier called a token. The sensitive data is stored in a secure database or encrypted using an algorithm, which helps reduce the attack surface and minimize the effects of a successful data breach.</p>
<p>Here’s a quick rundown for CISOs on how runtime security and tokenization fit into ASM and an <a href=”https://www.techtarget.com/searchsecurity/The-ultimate-guide-to-cybersecurity-planning-for-businesses”>enterprise cybersecurity strategy</a>:</p>
<section class=”section main-article-chapter” data-menu-title=”Runtime security enables real-time ASM decisions”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Runtime security enables real-time ASM decisions</h2>
<p>Upwind Security offers a runtime-based cloud security platform. Rinki Sethi, chief security and strategy officer at Upwind, believes runtime will become critical for ASM as the use of <a href=”https://www.techtarget.com/searchenterpriseai/definition/agentic-AI”>agentic AI</a> becomes more prevalent in cyberse

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: