Remove 2005 Remove Accountability Remove Digital transformation Remove Technology
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. This applies to established companies migrating to cloud infrastructure as well as to digital native startups. Related: How ‘PAM’ improves authentication.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? Here are a few key takeaways.

Risk 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. What’s happening is that digital transformation, while providing many benefits, has also dramatically expanded the attack surface. “An

article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

Initially introduced in 2005, CVSS is a framework for rating the severity of security vulnerabilities in software. And they must be fully addressed if digital commerce is to reach its full potential. Accounting for the business processes requires specific understanding of how the OT algorithms and applications work. Barda: Yes.

IoT 174
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem.