article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever.

article thumbnail

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA

Thales Cloud Protection & Licensing

In response to ongoing security threats and privacy violations, the Department of Health and Human Services (HHS) has published significant updates to the HIPAA Security Rulethe first substantial revision since 2013. These proposed changes aim to strengthen protections for patient data and enhance trust in healthcare systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New FIDO2 Devices offer a single token for combined PKI – FIDO use cases, without the need to rip and replace existing infrastructure

Thales Cloud Protection & Licensing

Established in 2013, the FIDO alliance is an open industry association focused on developing authentication standards to help reduce the world’s over-dependency on passwords. The combination of prominent media-reported mega breaches and less famous identity thefts have promoted the industry to adopt passwordless authentication methods.

article thumbnail

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

The Last Watchdog

There’s a temptation to dismiss it as a mere nuisance; companies deep into ‘digital transformation,’ in particular, might be lulled into this sort of apathy. Bilogorskiy: Before 2013 a lot of malware was focused on spam, DDoS and monetizing through malicious advertising and ad fraud.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. The path this San Mateo, CA-based vendor is trodding tells us a lot about the unfolding renaissance of SIEMs – and where it could take digital commerce.

Big data 157
article thumbnail

NEW TECH: Trend Micro inserts ‘X’ factor into ‘EDR’ – endpoint detection and response

The Last Watchdog

Here are my big takeaways: Prevention vs. detection In 2013, Gartner analyst Anton Chuvakin coined “EDR” to classify an emerging set of tools designed to go beyond signature-based antivirus software which was designed primarily to identify specific malicious binary files. For a full drill down, give a listen to the accompanying podcast.

Antivirus 147
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

The company launched in 2013, the brainchild of Ryan Trost and Wayne Chiang, a couple of buddies working as security analysts in a U.S. At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. We spoke at Black Hat USA 2019.

Big data 153