Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

The data center is becoming a security enforcement layer

The security model most enterprises still rely on assumes there is time to respond, time to patch, time to detect, time to contain when an attacker gets in, but there is still time to stop them before they can move through the environment and do harm.

Last week, I attended RSA Conference 2026 and attended several sessions where that assumption came under pressure from multiple directions. Across talks on runtime defense and Kubernetes security, a consistent theme emerged: both the time defenders have to act and the distance attackers need to travel are rapidly collapsing.

In the session “When AI Steals Your Patch Window: Beating the Clock with Runtime Defense,” Dan Wendlandt, vice president of product management at Cisco, described how quickly the traditional vulnerability lifecycle is breaking down. AI is accelerating every phase of exploitation by identifying vulnerabilities in widely deployed code and generating working exploits.

In one example in Wendlandt’s session, attackers moved from vulnerability disclosure to target identification within hours, with exploit code and active attacks following shortly after. The implication is straightforward: Organizations cannot patch fast enough to keep pace with exploitation timelines that are increasingly measured in hours, not weeks.

Modern infrastructure removes friction for an attacker

If faster exploitation were the only issue, defenders might still rely on segmentation and layered controls to slow attackers down. But modern environments are removing that friction.

In “K8s Post-Exploitation Spinoff,” Roi Nisimi, principal security researcher at Orca Security, explained how Kubernetes fundamentally changes what happens after initial access. In traditional environments, attackers had to navigate segmented networks, escalate privileges step by step, and work to reach sensitive systems. That process introduced time and resistance. In Kubernetes, that distance largely disappears.

Clusters are often flat by default, workloads are tightly interconnected, and identity becomes the primary control mechanism. Once inside, attackers can move quickly across services, access credentials, and escalate privileges.

As Nisimi showed, the gap between access and impact has effectively collapsed. In some cases, attackers can move from initial access to meaningful control in minutes.

Taken together, these trends expose a fundamental weakness in traditional security models. By the time an attack is detected, exploitation may already have occurred and lateral movement may already be underway. Controls that rely on perimeter inspection or post-execution response are operating too far from where attacks actually unfold. The response emerging across sessions is not simply faster detection, but a shift in where security is enforced.

Wendlandt pointed to technologies like eBPF, which allow security logic to run directly inside the operating system kernel. From that position, security tools can observe and act on system behavior in real time. Because these controls operate inline, they can prevent actions before they complete, rather than reacting after execution .

That changes the model because processes can be blocked before they start, exploit chains can be interrupted mid-execution and lateral movement can be stopped inside the environment. Instead of relying on visibility alone, organizations can enforce policy at the point where workloads actually run.

The data center is becoming the control layer

One of my takeaways from the sessions is that the combination of faster attacks and more connected environments is forcing a different role for the data center. For years, infrastructure strategy has been framed around where applications run: on-premises or in the cloud. But that question is becoming secondary to a more urgent one: where can control actually be enforced?

Increasingly, the answer is inside the environment itself. The data center is no longer just where applications run. It is becoming the place where security decisions are enforced — where behavior is monitored and actions are either allowed or stopped in real time.

That shift shows up in several ways:

  • Workload identity becomes the primary control point.
 In environments like Kubernetes, identity determines what a workload can access, often regardless of network location. Enforcing least privilege at that layer becomes critical because once identity is compromised, movement is immediate.
  • Runtime behavior becomes the enforcement surface. 
Instead of relying on detection after execution, controls are moving inline — inside the operating system and runtime — where processes can be blocked before they start and exploit chains can be interrupted midstream.
  • Internal traffic matters more than perimeter traffic.
 East-west movement inside environments is now where attacks succeed or fail. That makes visibility and control inside the data center more important than inspection at the edge.
  • Policy has to follow the workload.
 In hybrid and multi-cloud environments, workloads move constantly. The only way to maintain consistent security is to enforce policy wherever the workload runs, not just at a fixed boundary.

As these changes take hold, the data center — whether physical or cloud-based — becomes less about infrastructure and more about control. It is where organizations can enforce consistent security decisions across increasingly fragmented environments. And as the gap between access and impact continues to shrink, that enforcement layer is becoming not just important, but essential.

What CIOs need to rethink

For CIOs, the takeaway is not simply that threats are increasing. It is that the underlying model of defense is changing. For years, security strategy has been built on a sequence: prevent what you can, detect what you miss, and respond before damage spreads. That sequence assumed time and separation — time to react, and distance between initial access and meaningful impact. But both are disappearing.

Three shifts now stand out:

  • From patching to protection. 
Patching remains necessary, but it can no longer serve as the primary line of defense. Vulnerabilities are being exploited faster than organizations can remediate them, often within hours of disclosure. That forces a shift in mindset. Instead of assuming vulnerabilities will be fixed before they are used, organizations have to assume exploitation will happen and design controls that limit what an attacker can do in that window. The focus moves from eliminating risk to containing it.
  • From perimeter to runtime
. The traditional model placed heavy emphasis on the network edge: firewalls, gateways, and access controls designed to keep threats out. But in environments where workloads are distributed, interconnected, and often ephemeral, the perimeter is no longer a reliable boundary. Security has to move closer to where applications actually run. That means operating inside containers, virtual machines, and orchestration layers, where identity, behavior, and interaction can be observed and controlled directly.
  • From detection to enforcement
. Detection remains important, but it is no longer sufficient on its own. By the time an alert is generated, an attacker may have already executed code, established persistence, or begun moving laterally. The priority shifts to controls that can act in-line — blocking a process before it executes, preventing a privilege escalation, or stopping a suspicious connection as it happens. In this model, enforcement is not a follow-on step. It is the control point.

Security is moving from a reactive discipline to a continuously enforced system of control embedded within the infrastructure itself. For CIOs, that requires rethinking not just tools, but architecture, how environments are designed, where controls live, and how consistently they can be applied as applications move across platforms. The question is both if you can stop an attack and also where it actually happens.

Rethinking where security lives

The industry has spent the last decade optimizing where applications run. Now it is being forced to rethink where security happens. As AI accelerates exploitation and modern infrastructure accelerates attacker movement, enforcement is moving closer to the workload itself. The data center is no longer just infrastructure. It is becoming the last place security can still hold.

This article is published as part of the Foundry Expert Contributor Network.Want to join?


Read More from This Article: The data center is becoming a security enforcement layer
Source: News

Category: NewsMarch 30, 2026
Tags: art

Post navigation

PreviousPrevious post:Amazon waives entire month’s AWS charges after Iranian drone attackNextNext post:クラウド、DevOps、アジャイルの浸透度:日米SIの開発プロセスと技術選定の差

Related posts

샤오미, MIT 라이선스 ‘미모 V2.5’ 공개···장시간 실행 AI 에이전트 시장 겨냥
April 29, 2026
SAS makes AI governance the centerpiece of its agent strategy
April 29, 2026
The boardroom divide: Why cyber resilience is a cultural asset
April 28, 2026
Samsung Galaxy AI for business: Productivity meets security
April 28, 2026
Startup tackles knowledge graphs to improve AI accuracy
April 28, 2026
AI won’t fix your data problems. Data engineering will
April 28, 2026
Recent Posts
  • 샤오미, MIT 라이선스 ‘미모 V2.5’ 공개···장시간 실행 AI 에이전트 시장 겨냥
  • SAS makes AI governance the centerpiece of its agent strategy
  • The boardroom divide: Why cyber resilience is a cultural asset
  • Samsung Galaxy AI for business: Productivity meets security
  • Startup tackles knowledge graphs to improve AI accuracy
Recent Comments
    Archives
    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.