article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. The security team needs to be at the table, working alongside the developers and the operations teams, providing the risk management view for security. Oil and water. Roadmap needed.

article thumbnail

Episode 180: Gary McGraw on Machine Learning Security Risks

The Security Ledger

The post Episode 180: Gary McGraw on Machine Learning Security Risks appeared first on The Security Ledger. Also: SMBs Struggle with Identity Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk Spotlight Podcast: The Demise of the Password may be closer than you think!

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. Remote desktop risks.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In 1990, Florin and Mariuca Talpes parlayed a $300 stake borrowed from a relative into a company which would become Bitdefender in 2001. In this fast-evolving, digitally-transformed, business environment, enterprises in 2018 will spend a record $3.8 Here are a few big takeaways: Smarter spending. keep intensifying.

Antivirus 174
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

With three product variations, IBM Security Guardium Insights offers risk visibility with centralized audit data; Data Protection classifies data, sets controls, and monitors user activity; and Data Encryption shields data with file and application-level encryption and centralized key management. Microsoft Azure.

Firewall 120