Remove 2005 Remove Digital transformation Remove Ransomware Remove Technology
article thumbnail

MY TAKE: Log4jā€™s big lesson ā€“ legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. That said, a couple of prominent legacy technologies seem sure to endure as security cornerstones, moving forward.

Firewall 223
article thumbnail

MY TAKE: Equipping SOCs for the long haul ā€“ automation, edge security solidify network defenses

The Last Watchdog

Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. Primary vectors take the form of phishing campaigns, supply chain corruption and ransomware attacks, like the one that recently resulted in the shut down of Colonial Pipeline.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper. The earliest SIEMs cropped up around 2005 or so. Coming of age.

Big data 157
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. The Colonial Pipeline ransomware debacle and the near poisoning of the Oldsmar, Fla. Related: How ‘PAM’ improves authentication.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

That statue, it seems, had been placed on the ship as a prank by some students from the Helsinki University of Technology the night before. Mikko had read some of my reporting on Netsky, which Skynet backwards, a virus also known as Sasser, was a typical virus-of-the-day back in 2005. Instead we have these faceless ransomware groups.