article thumbnail

AI?—?Making Us What Again?

Security Boulevard

Translation — We plan to do more with fewer people to achieve our digital transformation strategy, which currently is way over budget and only 50% completed. Case in point — Circa 2004 — “PEOPLE are moving to the cloud to save money and resources! People make these things happen; we always have and will.

article thumbnail

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The Last Watchdog

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Having covered tech security since 2004, I can attest that there is plenty of room for more clarity, and less hype, in security products marketing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

An understanding that cloud migration, cloud security, and digital transformation are prevailing cybersecurity and risk management trends in federal (and commercial) cybersecurity and risk management. The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise.

CISO 109
article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

The digital skills gap comes at a cost. trillion cumulative GDP growth.The skills gap is slowing digital transformation and in cybersecurity it’s increasing risks. Digital leaders need to solve this issue fast and technology has a valuable part to play in this. 14 G20 countries could miss out on $11.5

CISO 130
article thumbnail

CyberArk Named an Overall Privileged Access Management Leader by KuppingerCole Analysts in 2021 Leadership Compass Report

CyberSecurity Insiders

According to the KuppingerCole report, “the demands of digital transformation and wholesale structural changes to IT architecture have intensified interest in PAM software and applications – across all market sectors.”. 1 – KuppingerCole Analysts 2021 “Leadership Compass: Privileged Access Management,” by Paul Fisher, August 2021.

article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

Threat actors simply seek out the endless fresh attack vectors arising as an unintended consequence of digital transformation. I first wrote about criminal botnets at USA TODAY in 2004. Today we’re in the throes of digital transformation. In short, layered defenses have turned out to be cheesecloth.

article thumbnail

Machine Identities, Human Identities, and the Risks They Pose

Security Boulevard

That’s the highest volume of attempts spotted in a single month since APWG first initiated its reporting program back in 2004. Digital transformation initiatives are in jeopardy because attackers are able to exploit wide gaps in machine identity management strategies.

Risk 52