article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

The Last Watchdog

Make no mistake, CMMC 2.0 , which has been under development since 2017 , represents a sea change. This seems very basic, yet it is something many organizations in the throes of digital transformation have left in disarray. Cybersecurity Maturity Model Certification version 2.0

article thumbnail

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

The Last Watchdog

Related :Promise vs. pitfalls of IoT For small- and mid-sized businesses, firewalls, antivirus suites and access management systems represent the entry stakes for participating in today’s digital economy. Threat actors simply seek out the endless fresh attack vectors arising as an unintended consequence of digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. Related: The ‘Golden Age’ of cyber espionage is upon us.

article thumbnail

Cyber Defense Magazine: Exclusive Interview with Robert Herjavec

Herjavec Group

Check out how China teleported a photon into space in 2017. History shows he’s the first person to wrap the remote management business model around firewalls, from a small office on the east coast of Canada., In 2003, he knew that firewalls were too complex for all IT staff and for understaffed companies to manage.

article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures to a minimum level. Corporate America’s love affair with cloud computing has hit a feverish pitch. Meanwhile, 73.5

article thumbnail

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

The Last Watchdog

Related: How 5G will escalate DDoS attacks Caught in the pull of digital transformation , companies are routing ever more core operations and services through the Internet, or, more precisely, through IP addresses, of one kind or another. For a full drill down on our conversation, give a listen to the accompanying podcast.

DDOS 171
article thumbnail

NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level

The Last Watchdog

Yet in the age of Big Data and digital transformation many organizations still don’t do this very well. Hackers leveraged a vulnerability in something called Apache Struts , an open-source application framework that supports the credit bureau’s web portal, and merrily exfiltrated the data, between May 13 and July 30, 2017.