article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

I had an enlightening discussion about this with Dana Tamir, vice president of market strategy for Silverfort , a Tel Aviv-based supplier of multi-factor authentication technology. LW: What obstacles are companies running into with cloud migration? This becomes a barrier to cloud migration. We spoke at RSA 2020.

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

Related: How credential stuffing fuels account takeovers. In pulling off that milestone hack, Paige Thompson took advantage of CapOne’s lack of focus on cloud security as the banking giant rushed headlong into leveraging Amazon Web Services. Here are the key takeaways: Cloud migration risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

They must take into account a widely scattered workforce and somehow comprehensively mitigate new and evolving cyber threats. We can plug in parts or all of a complete stack of cutting-edge security technologies, and provide the expertise an organization requires to operate securely in today’s environment.”.

article thumbnail

5 Cyber Trends to Expect in 2024

NetSpi Executives

Vinay Anand CPO What we saw with AI and LLMs, and given the amount of investment that has gone into progressing this technology, I expect to see rapid innovation in all aspects of LLM usage in 2024—specifically at the foundational level, such as scale and efficiency.

article thumbnail

Thales and Palo Alto Networks collaborate to offer mid-markets the enterprise protection

Thales Cloud Protection & Licensing

A zero-trust framework is vital to any cloud migration path. Through three technology integrations, businesses will gain access to their internal resources, protected by a robust, highly resilient security architecture. Deploying the Zero Trust model.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. Attacks targeting these resources aren’t targeting exposed data.

article thumbnail

RSAC insights: How the ‘CIEM’ framework is helping companies manage permissions glut

The Last Watchdog

To deliver on all of these rich digital services, hundreds of billions of human-to-machine and machine-to-machine identities, each represented by an account, must be connected on the fly. And each new connection represents another access point that can potentially be maliciously manipulated by an unauthorized party.