Remove 2021 Remove Cloud Migration Remove Digital transformation Remove Risk
article thumbnail

Digital Resilience is the New Digital Transformation KPI

Security Boulevard

Digital Resilience is the New Digital Transformation KPI. Wed, 04/14/2021 - 08:58. Innovation and digital transformation rely on digital resilience to turn business disruption into revenue opportunities. Apr 14, 2021. What is Digital Resilience? Modernize to Support Digital Resilience .

article thumbnail

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Thales Cloud Protection & Licensing

Evolution of Cloud Security: From Shared Responsibility to Shared Fate. Tue, 11/09/2021 - 11:20. Over the past year and a half, we have witnessed seismic changes with the accelerated adoption of the cloud and the shift to hybrid working. The digital transformation “mega trends”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco wins SC Media Award for “Best Security Company”

Cisco Security

SC Media has named Cisco the “Best Security Company” as part of its 2021 SC Awards. It represents years of innovation and commitment to reinventing cybersecurity in order to keep pace with the increasing demands of digital transformation and ever-evolving attacks.

Media 138
article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

On August 3, 2021, the Senate Homeland Security and Governmental Affairs (HSGAC) released a report entitled “Federal Cybersecurity: America’s Data Still at Risk.”. The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise. See: [link] ).

CISO 104
article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

The Thales Access Management Index 2021 report illustrates a highly fragmented landscape at the enterprise level. Coordinating that many systems can, at a minimum, create operational complexity, but it can also increase the risk of errors or misconfigurations creating security gaps. Protect cryptographic keys.

article thumbnail

We’ve moved to the cloud. Now, where on earth did I put those keys?

Thales Cloud Protection & Licensing

We’ve moved to the cloud. Thu, 06/17/2021 - 12:51. Key management in a cloud scenario: Me: I’m not sure where my keys are actually…. The move to the cloud or the transition to multiple clouds is likely the case for the vast majority of enterprise IT infrastructures. Learn how Guardium can ease cloud migration.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. What this allows decision makers to do is visualize risk,” Kedrosky says. And graph analytics allows them to map out their risk.”. Visualizing dependencies.

Risk 214