“For example, securing public and private addresses is similar to a DMZ but organization fail to consider hypervisor access, management tools, dormant instances, and DevOps security. Expertise for these attributes typically require outside expertise to validate and recommend the best approach before they become a liability,” said Morey Haber (@MoreyHaber), Chief Technology Officer at Beyond Trust.