RSAC 2024: How CNAPP Became Cloud’s De Facto Standard

Shai Morag, senior vice president and general manager of Tenable’s cloud security business, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss how cloud-native application protection platforms (CNAPPs) have emerged as the all-in-one choice for handling multiple security management challenges.

Shai Morag, senior vice president and general manager of Tenable’s cloud security business, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss how cloud-native application protection platforms (CNAPPs) have emerged as the all-in-one choice for handling multiple security management challenges. Though CNAPPs didn’t exist as a product category five years ago, companies like Tenable have popularized these all-in-one environments for managing cloud security. Morag summarizes the common cloud-based threats companies must contend with, and also enumerates new skills that security pros should acquire or sharpen to get maximum benefit from their CNAPP. And Morag offers some advice on what prospective CNAPP customers should be asking themselves before deploying.

Shai Morag is a seasoned entrepreneur and a cybersecurity expert. He leads the Cloud Security division within Tenable where he serves as the Senior Vice President and General Manager of Cloud Security. Shai joined Tenable through the acquisition of Ermetic where he was the CEO and a co-founder.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights