{"id":15421,"date":"2026-01-07T14:57:12","date_gmt":"2026-01-07T14:57:12","guid":{"rendered":"https:\/\/newestek.com\/?p=15421"},"modified":"2026-01-07T14:57:12","modified_gmt":"2026-01-07T14:57:12","slug":"how-to-eliminate-it-blind-spots-in-the-modern-ai-driven-enterprise","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15421","title":{"rendered":"How to eliminate IT blind spots in the modern, AI-driven enterprise"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p><a id=\"_msocom_1\"><\/a>The more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what\u2019s going on. The result is a growing number of blind spots \u2013 hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents \u2013 that can introduce significant risk long before a red flag appears in tooling.<\/p>\n<p>How can CSOs and other security leaders stay ahead of this increasingly dynamic attack surface\u00a0while minimizing tool sprawl? We asked members of the Foundry Influencer Network to share their best advice for strengthening security posture. Across all experts, a clear message emerges: The answer lies in improving visibility across existing systems, normalizing data flows, and applying AI-driven intelligence to both human processes and technical signals.<\/p>\n<p><strong>Shift from reactive postures to unified visibility<\/strong><\/p>\n<p>Avoiding blind spots requires a fundamental shift in how organizations think about visibility, says Mircea Trofimciuc (<a href=\"https:\/\/www.linkedin.com\/in\/mirceatrofimciuc\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Mircea Trofimciuc<\/a>), Vice President of Agentic AI (Product &amp; Engineering) at RealPage, Inc.<\/p>\n<p>\u201cTo avoid blind spots without stacking yet another tool on the pile, CSOs need to shift from a purely reactive posture to a unified visibility strategy. The current API security, code scanning, observability, and monitoring capabilities all still have a clear place \u2014 they remain foundational,\u201d he says. \u201cBut as enterprises become increasingly AI-dependent and distributed, these traditional signals must be complemented with a new layer of intelligence: the detection of agentic AI behavior via pattern adherence within systems.\u201d<\/p>\n<p>He notes that many blind spots now emerge from the behavior of AI systems themselves\u2014not just from static configuration issues\u2014and this demands a more dynamic view of the environment. \u201cBy continuously evaluating whether AI agents, services, and automations are behaving within defined, governed controls, rather than simply checking for static misconfigurations, security leaders can surface hidden risks early, across the entire digital footprint,\u201d Trofimciuc says.<\/p>\n<p>Peter van Barneveld (<a href=\"https:\/\/www.linkedin.com\/in\/peter-van-barneveld-foresight-innovation-catalyst\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Peter van Barneveld<\/a>), Group Innovation Manager at Dustin, adds that AI introduces vulnerabilities that often fall outside traditional defenses.<\/p>\n<p>\u201cBesides traditional security risks, AI introduces new vulnerabilities such as data poisoning and prompt injection attacks, which often fall outside traditional security controls,\u201d he says. \u201cThis is why it is essential to have a modular approach when it comes to security architecture and platform. It should be possible to leverage current possibilities on existing platforms, such as Azure or AWS, and to easily extend with new security building blocks so that the entire IT landscape can be covered, including the new AI stack components.\u201d<\/p>\n<p><strong>Align people, processes, and data to reveal hidden risks<\/strong><\/p>\n<p>Several experts emphasized that more tooling is not the answer. Instead, the answer lies in greater alignment.<\/p>\n<p>Will Kelly (<a href=\"https:\/\/www.linkedin.com\/in\/willkelly\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Will Kelly<\/a>), a writer focused on AI and the cloud, notes that visibility often breaks down not because of missing tools but because of siloed processes.<\/p>\n<p>\u201cCSOs don\u2019t always need to throw more tools at the problem to reduce blind spots. They need to better align people, processes, and data. Start by using existing FinOps and cloud cost metrics to identify anomalies in usage patterns, which often reveal hidden risks such as shadow IT or misconfigured services,\u201d he says. \u201cCollaboration between security and FinOps teams can help surface these insights without a new tool investment. Also, regular audits and tagging practices across cloud environments help make your cloud footprint more transparent and manageable.\u201d<\/p>\n<p>Sarv Kohli (<a href=\"https:\/\/www.linkedin.com\/in\/sarvkohli\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Sarv Kohli<\/a>), CIO and VP Technology and Adjunct Professor at Georgia Tech Professional Education, agrees that the biggest opportunity for reducing blind spots comes from better orchestration, not expanding the stack.<\/p>\n<p>\u201cConnect technology with data, people, and processes. As organizations push deeper into AI, their attack surface evolves faster than any one tool can contain,\u201d he says. \u201cThe real opportunity isn\u2019t buying more technology; it\u2019s in orchestrating what already exists with tighter alignment between people, processes, and data. When teams share a single, living view of their AI, cloud, and identity landscape, and stay accountable for what changes, security leaders can reveal and resolve blind spots without expanding their security stack and close hidden gaps long before they become headlines.\u201d<\/p>\n<p>Scott Schober (<a href=\"https:\/\/www.linkedin.com\/in\/snschober\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Scott Schober<\/a>), President\/CEO at Berkeley Varitronics Systems, Inc., underscores the operational complexity facing modern security teams.<\/p>\n<p>\u201cIt\u2019s tough to avoid blind spots in today\u2019s digital without spending more. The environment is just too complex to manage manually. The attack surface keeps expanding, and old manual processes just can\u2019t keep up with AI, cloud systems, and remote teams,\u201d he says. \u201cFrom my perspective, the key isn\u2019t just adding more tools. It\u2019s about connecting the ones you have more effectively, automating where it helps, and really knowing your existing systems.\u201d<\/p>\n<p><strong>Use existing telemetry and governance models to their full potential<\/strong><\/p>\n<p>Vivek Singh (<a href=\"https:\/\/www.linkedin.com\/in\/imdbest333\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Vivek Singh<\/a>), Senior Vice President of IT and Strategic Planning at PALNAR, says unified visibility is achievable using what most enterprises already have in place\u2014if they enforce standards and normalize existing signals.<\/p>\n<p>\u201cAll security leaders (CSO and VP\u2019s) should ensure unified visibility across assets, identities, and data flows through continuous monitoring, well-defined governance, and collaboration with IT and engineering teams,\u201d he says. \u201cThis way your dependencies on external security tools are very minimal. Removing blind spot requires normalizing existing telemetry and enforcing configuration standards and automation detection workflows.\u201d<\/p>\n<p>Anshul Gandhi (<a href=\"https:\/\/www.linkedin.com\/in\/anshul-gandhi\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Anshul Gandhi<\/a>), former Senior Machine Learning Engineer at Dell Technologies, stresses the importance of treating the enterprise landscape as an interconnected system rather than isolated components.<\/p>\n<p>\u201cSecurity leaders need the ability to map their environment as a living, interconnected system, not as a collection of isolated components,\u201d he says. He explains that this level of awareness depends on deeper visibility and \u201cunifying telemetry across AI pipelines, cloud services, data platforms, and identity layers so the organization can observe how workloads, models, and data behave in real time.\u201d<\/p>\n<p>\u201cOnce this visibility exists, a genuinely data-centric posture becomes possible, where leaders track how sensitive information moves through training pipelines, inference endpoints, and distributed applications, understand which models and services can access it, and anticipate how misconfigurations could expand the blast radius of an incident,\u201d he adds.<\/p>\n<p>Others see enormous opportunity in using AI-driven automation to enhance (not expand) security tools already in use.<\/p>\n<p>\u201cCSOs have to invest heavily in AI-powered automation through agents to proactively and continuously seek and eliminate blind spots,\u201d says Kumar Srivastava (<a href=\"https:\/\/www.linkedin.com\/in\/kumarsrivastava\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn: Kumar Srivastava<\/a>), Chief Technology Officer at Turing Labs. \u201cMost existing enterprise investments in security tools are not fully leveraged to their max capacity. Without investing in new tools, CSOs can dramatically increase ROI by connecting, integrating existing tools and driving deeper insight.\u201d<\/p>\n<p><strong>A path forward: visibility through orchestration, not expansion<\/strong><\/p>\n<p>The expanding digital footprint created by AI, cloud services, and distributed applications cannot be secured by piling on additional tools. What\u2019s needed is a unifying layer that grounds all this telemetry, governance, and automation in a single source of truth.<\/p>\n<p>This is where a modern CMDB becomes indispensable. Beyond serving as an accurate, continuously updated system of record, a CMDB provides the structured relationships needed to build enterprise knowledge graphs. By capturing assets, configurations, dependencies, and interactions as connected data, it gives AI applications the context they require to reason, correlate signals, and detect risk across complex environments. These knowledge graphs allow AI-driven security tools and agents to understand how systems, identities, workloads, and AI services relate to one another, thereby transforming raw telemetry into actionable intelligence grounded in a trusted, authoritative view of the environment.<\/p>\n<p>In doing so, a CMDB transforms fragmented visibility into coordinated insight, allowing security leaders to reveal blind spots earlier, respond faster, and strengthen posture without expanding their security stack.<\/p>\n<p>To learn more, visit <a href=\"https:\/\/solutions.opentext.com\/cloudops\/discovery-and-cmdb\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/solutions.opentext.com\/cloudops\/discovery-and-cmdb\/<\/a><\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems together, the harder it becomes for traditional security practices to present a complete picture of what\u2019s going on. The result is a growing number of blind spots \u2013 hidden misconfigurations, inconsistent controls, and unpredictable behaviors across systems and AI agents \u2013 that can introduce significant risk long before a&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15421\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15421","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15421"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15421\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}