Informationweek Sponsored Article Cloud Threats Are Different, Your Security Should Be Too As organizations scale cloud environments, they create new threat vectors that pose fundamental challenges to existing security operating models. In the unlikely chance that you haven't noticed, enterprises have been rapidly moving IT infrastructure and operations to the cloud for a while now. This 'new' foundation is helping deliver innovative capabilities and applications at an amazing pace. However, as organizations scale these nascent cloud environments, they are creating large, new attack surfaces, which poses fundamental challenges to existing security models. Modernizing the Application Deployment Lifecycle Developers can now rapidly deploy, manage, and tear down cloud environments using tools and automations like infrastructure-as-code (IaC) templates and container registries, as part of continuous integration and development (CI/CD) pipelines.