article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

If you haven’t heard, we are undergoing “digital transformation.” Digital advances are coming at us fast and furious. Misuse and manipulation of machine identities almost certainly is coming into play in the type of deep breaches digitally-transformed organizations are now experiencing. Security responsibilities.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be. (LW

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

In fact, API stands for Application Programming Interface, the indispensable technology that makes it possible for software applications to exchange data across the Internet. APIs have been a cornerstone of our digital economy from the start. Related: Cross-site scripting threat heats up.

article thumbnail

European Businesses Signal ‘Growing Security Gap’ Amid Mass Digital Transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

Companies are being compelled to embrace digital transformation, or DX , if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high velocity. A core security challenge confronts just about every company today.

article thumbnail

European businesses signal ‘growing security gap’ amid mass digital transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. This applies to established companies migrating to cloud infrastructure as well as to digital native startups. Related: How ‘PAM’ improves authentication.