article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Vulnerability management, or VM, has long been an essential, if decidedly mundane, component of network security. Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. Related: Log4J’s long-run risks.

Risk 235
article thumbnail

SOC 2 Compliance for Kubernetes with Fairwinds Insights

Security Boulevard

As the pace of digital transformation accelerates, many organizations are adopting Kubernetes for managing their containerized workloads. While Kubernetes brings scalability and reliability, it also introduces new challenges in security and compliance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales and Palo Alto Networks collaborate to offer mid-markets the enterprise protection

Thales Cloud Protection & Licensing

As more companies move along the path toward digital transformation, the need for better security has never been more evident. Thales has collaborated with fellow global security giant, Palo Alto Networks , to make zero-trust available at scale for businesses. Data Security. More About This Author >.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. One of the most intensive uses of criminal botnets is account takeovers.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

-based supplier of networking technology. Over the past year, I’ve had several deep conversations parsing how APIs have emerged as a two-edged sword: APIs accelerate digital transformation, but they also vastly expand the attack surface of modern business networks.

article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

The Last Watchdog

Crucially, this includes accounting for the cybersecurity posture of third-party partners. This comes down to reviewing IT systems, identifying sensitive assets, cataloguing all security tools and policies and, last but not least, implementing a reporting framework that can be audited. However, companies that view CMMC 2.0

article thumbnail

A COE for Zero Trust

SecureWorld News

The range of items will vary per company and vertical, but the term is very important as we continue to embark on digital transformations and work from home and work from anywhere initiatives. Organizations must adapt their security controls to home networks and even public WiFi. So how does this affect the COE?