Remove Accountability Remove Cloud Migration Remove Digital transformation Remove Risk
article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

Doing authentication well is vital for any company in the throes of digital transformation. Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are constantly connecting to each other across the Internet.

article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

This multi or hybrid cloud strategy can introduce unexpected complexities and challenges, which are exacerbated when different business units and teams adopt cloud solutions without the approval or knowledge of the central IT department. Storing data in the cloud also comes with a heightened risk of data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

Based in New York City, Sonrai launched in late 2017 to help companies gain clarity about data and identity security-related relationships within their public cloud envrionments, including Amazon Web Services, Microsoft Azure, Google Cloud. What this allows decision makers to do is visualize risk,” Kedrosky says.

Risk 214
article thumbnail

The Role Zero Trust Plays in Combating Privileged Credential Attacks

CyberSecurity Insiders

Due to the remote work boom and accelerated digital transformation projects, many of those conversations and exchanges are online. Zero Trust aims to take these privileged accounts off the playing field and implement a least privilege access control model. By Tony Goulding, cybersecurity evangelist, ThycoticCentrify.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

This was all part of the Lehi, Utah-based vendor’s efforts to support enterprise cloud migration and the rise of IoT systems, which were both gaining steam. This includes centralizing management of digital certificates and PKI across software supply chains, edge devices, remote users and evolving digital ecosystems. “We

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

On August 3, 2021, the Senate Homeland Security and Governmental Affairs (HSGAC) released a report entitled “Federal Cybersecurity: America’s Data Still at Risk.”. The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise. See: [link] ).

CISO 120
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Prior to joining Collins, Alexandra led Booz Allen’s Commercial Aerospace practice, building and overseeing multi-disciplinary teams to advise C-level clients on cybersecurity and digital transformation initiatives. During her first few years at Booz Allen, she supported technology, innovation and risk analysis initiatives across U.S.