Cloudanix Joins AWS ISV Accelerate Program

Cloud Security Guide Richard Stienmon

Vendor / Platform selection should be based on organization goals. CISOs & Security leaders should prioritize selection based on current posture and look at achieving a set of future goals vs compliance needs or by following a checkbox approach.Vendor health is an important aspect of determining a platform/vendor. For agent-based solutions, avoid & delay automatic updates from vendors.When rolling out vendor tools, follow a phased rollout and add the rollout as part of a contract clause. This will push vendors to prioritize implementation, support & training.

If you are struggling to navigate the complex landscape of cloud security. Our latest podcast episode featuring Richard Stiennon shares some invaluable insights and practical advice. From vendor selection to multi-cloud strategies and beyond, this podcast covers it all.

Guide to Cloud Security

You can read the complete episode transcript here >

Learnings from the podcast

  1. Vendor / Platform selection should be based on organization goals. CISOs & Security leaders should prioritize selection based on current posture and look at achieving a set of future goals vs compliance needs or by following a checkbox approach.
  2. Vendor health is an important aspect of determining a platform/vendor. For agent-based solutions, avoid & delay automatic updates from vendors.
  3. When rolling out vendor tools, follow a phased rollout and add the rollout as part of a contract clause. This will push vendors to prioritize implementation, support & training.

Learning resources recommended by Richard Stiennon

  1. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers

With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history

Get Sandworm on Amazon now >

  1. Security Yearbook 2024: A History and Directory of the IT Security Industry

A fascinating history of the cybersecurity industry as well as an up-to-date collection of leading cybersecurity vendors from around the globe

Get Security Yearbook 2024 on Amazon now >

  1. Countdown to Zero Day by Kim Zetter

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

Get Zero Day on Amazon now >

cta-image

Secure Every Layer of Your Cloud Stack with Cloudanix

Unify your security workflows with Cloudanix — one dashboard for misconfigurations, drift detection, CI/CD, and identity protection.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More

Saturday, Aug 02, 2025

Streamlining Just-in-Time Access: Balancing Security and Developer Workflow Integration

Introduction Just-in-Time (JIT) access is an undisputed cornerstone of modern cloud security. By eliminating standin

Read More