Remove 2017 Remove Digital transformation Remove Firewall Remove Technology
article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

The Last Watchdog

Make no mistake, CMMC 2.0 , which has been under development since 2017 , represents a sea change. The DoD is going to require contractors up and down its supply chain to meet the cybersecurity best practices called out in the National Institute of Standards and Technology’s SP 800-171 framework.

article thumbnail

Cyber Defense Magazine: Exclusive Interview with Robert Herjavec

Herjavec Group

Now, looking back, there isn’t a person on planet earth who would say that the cell phone is not an ‘obvious’ piece of technology. Check out how China teleported a photon into space in 2017. Teleportation is a building block for a wide range of technologies. Welcome to the information technology storm. Sounds absurd?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures to a minimum level. Meanwhile, UEBA and SOAR technologies, which have come along to boost the horsepower of SIEMs, are advancing. Meanwhile, 73.5

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. They are now chief privacy officer and chief technology officer, respectively.

article thumbnail

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

The Last Watchdog

Related: How 5G will escalate DDoS attacks Caught in the pull of digital transformation , companies are routing ever more core operations and services through the Internet, or, more precisely, through IP addresses, of one kind or another. Baffin Bay, which supplies its technology to partner MSSPs, is part of this shift.

DDOS 171
article thumbnail

Combatting ransomware: a holistic approach

IT Security Guru

It’s clear then that ransomware didn’t reach its zenith with WannaCry back in 2017 but remains a disruptive and profitable threat to business operations. Better operational practices, rather than technology, is really the key issue for a lot of businesses affected by ransomware. Security hygiene is the best defence.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

That’s Gartner’s estimate of global spending on cybersecurity in 2017 and 2018. Virsec is a leading innovator of memory protection technologies. Fast forward to 2017. Whoever was behind NotPetya, notably, leveraged the stolen NSA tools, to completely destroy global shipping company Maersk’s computer network in 2017.

Hacking 212