Willie Tejada
Austin, Texas, United States
5K followers
500+ connections
View mutual connections with Willie
Willie can introduce you to 10+ people at Aviatrix
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Willie
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
5K followers
-
Willie Tejada posted thisIt's playoff season, so I'll put this in terms that make sense to me. For years, cloud security played perimeter defense — watch the ball, react to what you see, hope your shot-blocker is in position. But agentic AI changed the game. The action is now inside the cloud, at speed, between workloads, APIs, models, data stores, and external AI providers. The play develops faster than any defender can rotate. Yesterday, we declared the Containment Era at Aviatrix. Today, I published what it looks like in production for AI workloads. Zero Trust for AI Workloads means actual enforcement. Approved destinations only. Default deny. Policy tied to the workload itself. If an AI agent, MCP server, RAG pipeline, or LLM proxy can reach anywhere by default, one compromised component moves the ball all over the court before anyone reacts. Good defense is not seeing the play develop. It is controlling spacing, cutting off passing lanes, and forcing low-percentage shots. Visibility matters, but containment wins games. Read more here: https://lnkd.in/g2Qp8rwe
-
Willie Tejada shared thisDoug's point here is not theoretical. It is the math. I spent my career on the other side of this argument — building developer ecosystems, scaling platforms. I have seen what happens when the architecture does not keep pace with the workload. That is exactly what happened in cloud security. Three forces converged at once: attackers industrialized, AI collapsed the cost of offensive capability, and cloud stayed insecure by default because the providers optimized for developer velocity. Each one accelerates the others. That is the Toxic Combination, and detection alone cannot close the gap it creates. Containment completes detection, not replaces it. When prevention fails, and detection is too slow, containment decides whether the incident becomes a breach. Proud to be part of the team bringing this architecture to market.Willie Tejada shared thisAviatrix CEO Doug M. helped build the detection era. Now, he is making the case for what comes next. AI-accelerated threats, industrialized attackers, and insecure-by-default cloud environments are changing the role of security architecture. The question is now: “What can the attacker reach when detection is too slow?” 👉 Read Doug’s latest on why cybersecurity has entered the Containment Era: https://loom.ly/zEDN8bw #CloudSecurity #Cybersecurity #AIsecurity #ZeroTrust #CISO
-
Willie Tejada reposted thisWillie Tejada reposted thisToday, Aviatrix is declaring the Containment Era. AI is accelerating vulnerability discovery, exploitation windows are collapsing, and supply chain attacks are moving through trusted code and legitimate credentials. The old priority order is broken. In the new Containment Era, Aviatrix CEO Doug M. introduces the Vulnerability Deficit Equation, showing why patching-first defense strategies have hit a structural ceiling. The takeaway is clear: containment is not a secondary priority. It is the foundation every other security priority depends on. When detection cannot tell the attack from legitimate activity, architecture determines the outcome. 👉 Learn more: https://loom.ly/1raUa-Q #CloudSecurity #CyberSecurity #ZeroTrust #AISecurity #CISO
-
Willie Tejada reposted thisWillie Tejada reposted thisWe're at a point where the security conversation needs to change. AI is a big reason why. More tomorrow.
-
Willie Tejada shared thisAI is fundamentally changing the security equation. As attacks scale, access becomes easier to achieve. The number of capable attackers is increasing, and most cloud architectures were not designed for that reality. This is the shift into the Containment Era. Not if someone gets in, but what limits how far they can go once they do.Willie Tejada shared thisThe internet is like one giant public park. Eight billion people can walk into it at any time, from anywhere in the world. But over the past decade, nearly every organization you interact with has moved your data into buildings that sit inside that park. And they moved quickly, with a critical assumption that hyperscale infrastructure meant hyperscale security. Unfortunately, that’s not the case. Cloud providers secure the structure. What happens inside, including segmentation, controls, and the pathways between systems, has always been the enterprise’s responsibility. For years, that gap was masked by a simple reality: very few attackers had the capability to exploit it at scale. That constraint just disappeared. AI has fundamentally changed the economics of attack. What once required time, skill, and focus can now be automated, accelerated, and widely distributed. We are now in the Containment Era, where detection is necessary but no longer sufficient. The defining metric of security is no longer time to detect. It’s blast radius, and blast radius is determined by architecture, not detection speed. I strongly encourage you to watch the full breakdown on this to learn the question every enterprise leader should be asking right now.
-
Willie Tejada reposted thisWillie Tejada reposted this"When ChatGPT launched, I went through months of depression." — Doug M., CEO, Aviatrix In this conversation, Doug speaks candidly about moving through that moment and coming to a clearer view of what leadership requires in the AI era: acknowledging the risks, resisting fear, and choosing to focus on the potential for benefit, abundance, and progress. Cc: The Meg & Amy Show, Meg Bear, Amy Wilson
-
Willie Tejada shared thisFor over two decades, security has been designed around keeping threats out. That model made sense when the boundary mattered, when users were the control plane, and when access was the primary risk. That is no longer the environment we operate in. We are now in The Containment Era. Threats arrive as trusted code, execute inside your environment, and move across a Trust Chain that your architecture does not govern. At the same time, machine identities outnumber humans 144:1—privileged, ephemeral, and ungoverned. Security is about limiting what compromised workloads can reach and how far Blast Radius spreads. This requires a shift from Chokepoint Security to Communication Governance. I cover what changed and what comes next in my latest blog. The link is in the comments.
-
Willie Tejada posted thisHaving a governance policy and having governance are not the same thing. Most organizations I talk to have both a strategy deck that says all the right things and an environment where none of it is enforceable. Different clouds, different accounts, different regions, workloads that were never designed to operate together. The architecture is fragmented, so the governance is, too. LiteLLM proved this last week. 36% of cloud environments. Credentials exfiltrated over standard HTTPS. Every governance framework in the world couldn't stop it because there was no enforcement layer in the network to execute the policy. That's the gap nobody wants to talk about: the distance between what companies say they govern and what they can actually control. Whether the conversation is AI governance, agentic AI, identity, or even hiring the right security talent, it always comes back to the same question: Does your architecture let you enforce anything consistently? If the answer is no, everything above it is theater. I've been digging into this over several recent conversations with Cyber Security Tribe — more in the comments.
-
Willie Tejada shared thisDoug is right — this isn't a vulnerability. It's an architecture problem. Our Threat Research Center broke down exactly how TeamPCP weaponized the LiteLLM supply chain — from Trivy compromise to PyPI credential theft to silent exfiltration of cloud keys and Kubernetes configs. The kill chain is clean, fast, and built to scale. The part that should keep security leaders up at night: there was nothing to detect. No CVE. No signature. The payload executed on every Python process startup. The only thing that stops lateral movement and exfiltration at that point is enforcement at the network layer — and most cloud environments don't have it. That's the gap we built Distributed Cloud Firewall to close.Willie Tejada shared thisLast week’s AI supply chain attack was a warning. Too many organizations still treat workload security as optional. It exposed how many organizations still rely on trust where they should be enforcing control. As you can see from the sophistication of this attack, workloads cannot be inherently trusted. There must be additional guardrails and protections at the network layer in a production environment. Every workload and every AI agent should be permitted to communicate only with explicitly approved destinations. Anything else should be blocked. If that control is in place, malware can execute and still fail when it tries to exfiltrate what it stole. That is why the attackers are not the whole story here. The harder question is why so many cloud environments still allow sensitive workloads to talk freely to the internet. The first people I look to are CISOs and CIOs. Too many organizations moved aggressively into the cloud without a serious plan to secure workloads, assuming security could be addressed later or resisting best practices because they might disrupt operations. That was a leadership choice. The second place I look is at the cloud providers. Their infrastructure may be secure, but customers were never told clearly enough that workload security is their responsibility. Permissive outbound access should never have become an accepted default. This incident also reflects a broader reality: as AI adoption accelerates, the risk of third-party software expands with it. Some dependencies are well-known, while others are buried in environments with no visibility or controls. Supply chain attacks will grow. Explicit egress control is one of the few defenses that scales ahead of that curve. Cloud security is a business risk, and it belongs in the boardroom.
-
Willie Tejada liked thisWillie Tejada liked thisToday, Aviatrix launched the industry’s first Containment Platform purpose-built for AI agents. With Zero Trust for AI Workloads and Aviatrix AgentGuard, enterprises can enforce workload-level Communication Governance across every cloud and compute model, including VMs, Kubernetes clusters, and serverless functions. This is containment by design: governing what each workload can reach without requiring agent or code changes, so AI systems can operate with the architectural limits enterprise security requires. Learn more about how Aviatrix is helping enterprises secure AI agents in the Containment Era. 👇 #AISecurity #CloudSecurity #ZeroTrust #CyberSecurity #CloudNative
-
Willie Tejada reacted on thisWillie Tejada reacted on thisAviatrix CEO Doug M. helped build the detection era. Now, he is making the case for what comes next. AI-accelerated threats, industrialized attackers, and insecure-by-default cloud environments are changing the role of security architecture. The question is now: “What can the attacker reach when detection is too slow?” 👉 Read Doug’s latest on why cybersecurity has entered the Containment Era: https://loom.ly/zEDN8bw #CloudSecurity #Cybersecurity #AIsecurity #ZeroTrust #CISO
-
Willie Tejada liked thisWillie Tejada liked thisToday, Aviatrix is declaring the Containment Era. AI is accelerating vulnerability discovery, exploitation windows are collapsing, and supply chain attacks are moving through trusted code and legitimate credentials. The old priority order is broken. In the new Containment Era, Aviatrix CEO Doug M. introduces the Vulnerability Deficit Equation, showing why patching-first defense strategies have hit a structural ceiling. The takeaway is clear: containment is not a secondary priority. It is the foundation every other security priority depends on. When detection cannot tell the attack from legitimate activity, architecture determines the outcome. 👉 Learn more: https://loom.ly/1raUa-Q #CloudSecurity #CyberSecurity #ZeroTrust #AISecurity #CISO
-
Willie Tejada liked thisWillie Tejada liked thisWe're at a point where the security conversation needs to change. AI is a big reason why. More tomorrow.
-
Willie Tejada liked thisWillie Tejada liked thisWe know this: AI is moving faster than most security teams can keep up with. ✅ We saw it in the early internet era: companies expanded fast, security fell behind, and risk spread across an environment no one fully understood. Now it is happening again across Kubernetes, APIs, and data pipelines. The challenge? Maintaining visibility and control before risk outpaces your ability to contain it. Aviatrix CTO and SVP of Engineering Anirban Sengupta breaks down what leaders need to get right. Full blog in the comments 👇 #CloudSecurity #AI #CyberSecurity #Multicloud
Experience
View Willie’s full profile
-
See who you know in common
-
Get introduced
-
Contact Willie directly
Other similar profiles
Explore more posts
-
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 Comment -
David Allinson
3K followers
Cool list, cooler impact. Splunk has landed on CRN’s 20 Coolest Cloud Monitoring and Management Companies of the 2026 Cloud 100. With Kamal Hathi, SVP and GM, at the helm, Splunk’s AI-powered agents are helping teams detect, respond, and remediate faster across observability and security. https://bit.ly/3Pey5P6
-
JFrog
92K followers
🔐 Want to make your #DevSecOps pipeline bulletproof? JFrog's SVP Security, Asaf Karas, covers how you’ll discover how to: • Embed #security into your #SoftwareSupplyChain with tools like #Curation and Transitive Contextual Analysis • Focus on the #CVEs that are critical, exploitable, and already running in production • Automate trust & attestation without slowing development • Build defense mechanisms that scale with your team like #AgenticRemediation 👉 Watch now and level up your #security game: https://bit.ly/4nHlfVX #CyberSecurityAwarenessMonth
34
-
DigiCert
196K followers
🚨The numbers in Forrester’s TEI report say it all. PKI is a security investment and a strategic advantage. The DigiCert team drives real results and proves that modern PKI can be both secure and scalable. If you’re still relying on manual workflows, now’s the time to rethink. 💭
12
-
Kai Rupponen
SUSE • 4K followers
📈 Whether you're a system administrator, developer or SRE, staying ahead in cloud-native computing means embracing the tools that give you a competitive edge. One of those tools? eBPF (Extended Berkeley Packet Filter) 🎉 From enhanced security and networking to next-level observability, eBPF is transforming how modern platforms monitor and understand operating systems and applications. That’s why SUSE integrates eBPF into our observability platform —delivering real-time insights, performance visibility and operational control across environments. 📖 Find out more: https://okt.to/WygrJV #eBPF #Observability #CloudNative #SUSE #DevOps #SRE #Linux #InfrastructureMonitoring #PlatformEngineering
-
Red Hat
2M followers
Aramco is utilizing Red Hat solutions to power its new GenAI Foundation. They’ve modernized 400 legacy applications and reduced VM configuration times from weeks to hours. They aren't just moving faster; they're providing a trusted, scalable platform for over 35,000 users. Discover their journey: https://red.ht/4kgmt96
57
-
Entranix
54 followers
🔐 How Entranix Closes the Loop in Endpoint Security Modern security teams don’t lack visibility. They lack execution. Too many tools. Too many alerts. Too much manual remediation. Constant environment drift. Visibility without action creates risk. Entranix transforms endpoint visibility into governed, automated outcomes. Here’s how: Detect: Unify signals across the entire endpoint stack. Eliminate blind spots. Create a single source of truth. Decide: Prioritise risk-driven actions. Cut through alert noise. Focus on what truly impacts business risk. Execute: Automate remediation directly at the endpoint layer. No delays. No ticket queues. No manual overhead. Just controlled, scalable automation. Verify: Validate outcomes continuously. Maintain compliance. Prevent environmental drift. Ensure risks stay resolved. This is autonomous endpoint remediation, built with governance, auditability, and real business impact. Because modern IT operations don’t just detect threats. They close the loop. #EndpointSecurity #CyberSecurity #AutonomousRemediation #ITAutomation #Governance #Compliance #RiskManagement #ModernIT #EnterpriseSecurity #Entranix
2
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
1h 10m
Advanced AI Analytics on AWS: Amazon Bedrock, Q, SageMaker Data Wrangler, and QuickSight
-
1h 32m
Advanced Data Processing: Batch, Real-Time, and Cloud Architectures for AI
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access