article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3 To Sum It Up.

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

I had the chance to meet with him again at Black Hat 2019 in Las Vegas. This skills deficit has been the top worry of IT pros for several years, according to tech consultancy ESG’s annual survey of IT pros; some 53% of the organizations participating in ESG’s 2018 -2019 poll reported a “problematic shortage” of cybersecurity skills.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

It was designed to make it convenient for system administrators to automate tasks and manage configurations across all Windows endpoints and servers in a company network. A privileged account provides access to sensitive systems and data bases and typically gets assigned to a system administrator or senior manager.

Hacking 212
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

The RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 people and 740 speakers — is a decent measuring stick for representation of women in this field. While RSAC keynotes saw near gender parity this year, women made up 32 percent of our overall speakers,” noted Toms.

article thumbnail

The Challenges in Building Digital Trust

SecureWorld News

System administrators didn't bother locking down their systems, because the possibility of bad actors using them didn't really cross their minds. An example of how mechanical trust works in a digital context can be illustrated by looking at community usage of facial recognition.