5000 CyberSecurity Vendors for 3 Cloud Service Providers Problem ??
Cloud Security Podcast
Award Winning Globally Ranked 100 Weekly LIVE Video & Audio Podcast talking about Cloud Security
CyberSecurity vendors and analysts loves acronyms to define a "new" security problem that we discover as unique enough to solve in most organizations but sometimes this is the exact reason why we end up in spaghetti solutions instead of the right one for the right problem.
The Business Reality of Cloud Security in 2025: Beyond Technical Solutions
Welcome to this week's edition of the Cloud Security Newsletter!
This week, we're diving deep into Cloud Security and the intersection of CyberSecurity industry vendors. CyberSecurity vendors and analysts have loved 4 letter acronyms to define a "new" security problem that we discover as unique enough to solve in most organizations but sometimes these are process problems or even how the technology has evolved.
With increasing popularity of AI experiments and case studies in most organizations there is a critical shift happening in cloud security tooling and we are again in perhaps a “new” problem area.
Vulnerability management and Posture tools in Cloud have dominated the cloud security landscape for over a decade, evolving from being a compliance and posture management to attack path visualisation for cloud security practitioners.
There's a growing recognition that landscape is evolving with AI and shift coming in Cloud Security due to AI getting more attention.
In this week’s issue our featured experts from Cloud Security Podcast, share their practical insights on potential areas of change for Cloud Security, the reality of security tools usage that’s perhaps enabling this change and next evolution of security solutions in the cloud domain.
Featured Experts This Week
Definitions and Core Concepts
Market Categories in Cloud Security:
CNAPP (Cloud Native Application Protection Platform): An integrated security platform that combines various cloud security capabilities. However, as James Berthothy notes, the definition has become increasingly broad and potentially problematic: "I really hate what analysts have done to CNAPP... I see some people even include SaaS as part of CNAPP, at which point, like it is literally every piece of security you could have."
Runtime Security: Security measures that protect applications while they're executing, as opposed to static analysis or configuration checks. This approach enables active response to threats rather than just identifying potential vulnerabilities.
CADR (Cloud Application Detection and Response): A emerging category focused on runtime protection for cloud workloads, specifically designed for SOC teams to effectively respond to containerized alerts.
This week's Issue is sponsored by Vanta
Proving trust is more important than ever. Especially when it comes to your security program.
Vanta helps centralize program requirements and automate evidence collection for frameworks like SOC 2, ISO 27001, HIPAA, and more, so you save time and money—and build customer trust.
And with Vanta, you get continuous visibility into the state of your controls.
Join more than 9,000 global companies like Atlassian, Flo Health, and Quora, who trust Vanta to manage risk and prove security in real time.
Download the GRC Buyer's Guide to learn more about continuous compliance and what to look for in a solution.
?? Our Insights from these Practitioners
1. The Reality of Security Tool Adoption
All experts highlighted a crucial disconnect in how security tools are built versus how they're actually used. Ross Haleliuk notes: "The vast majority of the market are companies that don't actually have incentives to invest in security, but they're the ones that need security the most."
James Berthothy adds a complementary perspective: "Most vendors in this space are very confused about how to go to market. They are vulnerability management but built for cloud applications."
Key implications for practitioners:
2. The Reality of Container-Centric Security
A particularly insightful observation from James challenges our traditional view of cloud security: "I think cloud security is really just container security and it almost always has been, but that's been obscured through several layers of people learning the infrastructure of how containerization works at the same time as cloud."
Ashish on recent Linkedin post shared the emerging pattern in most organisations: “Most companies have given the directive that it is a Kubernetes first compute for all new products or features that would be built. Virtual machines are only by exceptions“
This perspective suggests practitioners should:
3. The Business Reality Check
Ross Haleliuk provides a sobering perspective: "I believe that there are only two reasons why companies invest in security. One is sales enablement... The second bit is fear."
领英推荐
James Berthothy adds: "There are too many different users in that one platform for it to fully satisfy any one of them."
Ashish Rajan concurs: “The Expectation vs Reality behind the success of Security tool in an organization is decided by the coverage of the tool across the organization. In most cases they never match :(“
Practitioners should:
4. The Shift from Posture Management to Runtime Protection
James Berthothy presents a compelling argument for why runtime security deserves more attention in 2025. He notes: "This is why I push the runtime path so much is we've gone down this path as though we can create this perfectly secure cloud environment, where if we just fix all the vulnerabilities, there's no attacks. But fixing all the vulnerabilities is first of all, a waste of time. And it's second of all, like it can't be done."
Ashish Rajan added “I am seeing more organizations push CSPM/CNAPP metrics into real-time threat intelligence, aiming to build filter false positive and drive detect and respond instantly for alerts that true positive. The industry is buzzing about “real-time cloud security,” and vendors are positioning acquisitions or integrations around this“
Key takeaways for practitioners:
5. The Evolution of Security Tools and Teams
Ross Haleliuk provides valuable context about the broader security market: "When I worked in fintech, there were 50,000 vendors. In cybersecurity, there is about 5,000. So that is 10 times fewer. If you say that cybersecurity is everybody's problem, then 5,000 vendors is probably not that many."
This insight, combined with James's expertise, suggests:
This analysis reflects a significant shift in how we approach cloud security, moving from a predominantly static, posture-based approach to a more dynamic, runtime-focused strategy. As we progress through 2025, practitioners should consider how this evolution affects their security architecture and team structure.
Next week, we'll explore another critical aspect of cloud security. Stay tuned!
???Related Resources
???Related Podcast Episodes
We would love to hear from you?? for a feature or topic request or if you would like to sponsor an edition of Cloud Security Newsletter.
Thank you for continuing to subscribe and Welcome to the new members in tis newsletter community??
Peace!
Links
Global Cyber Risk Defense | Security Advisor | CISSP | CCSP | CCSK | CCZT | Athlete
1 个月Great article !
Senior Cloud security architect at Société Générale
1 个月Had a great time reading this episode! If you can't prevent risk, mitigate it. If you can't mitigate, there is little point flooding people with alerts... ?? And yes, this year we are indeed celebrating the 10th birthday of preventive cloud security posture, which started... in AZURE ?? https://www.dhirubhai.net/pulse/2015-2025-decade-preventive-cloud-security-christophe-parisel-vbkfe/
Cloud Security
1 个月??? ??? ???
Working on something new...
1 个月I need to up my images game, my friend - nothing is as impressive and engaging as your stuff ??
Great dad | Inspired Risk Management and Security | Cybersecurity | AI Governance | Data Science & Analytics My posts and comments are my personal views and perspectives but not those of my employer
1 个月Cloud Security Podcast I was waiting for this newsletter. Looking forward to reading it tonight.