article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Nonetheless, cloud computing will continue to dominate digital transformation efforts, and many benefits will occur including enhanced data asset protection, fewer compliance failures, cyber resilience, and business productivity. Sustainability. More companies will be focused on sustainability.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

This summer Gartner designated API security as a stand-alone pillar in its security reference architecture, not just an add-on component to other systems. A startling 95% of API attacks happen on authenticated endpoints. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me.

Big data 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Accelerate Government Transformation by Reducing Risk, Complexity, and Cost

Thales Cloud Protection & Licensing

From smart cities and digital IDs to open government and better governance, the Cloud, Big Data, IoT and Artificial Intelligence have enabled a wide range of digital government initiatives. Big transformation of big government. Data Security. White the White House order may be the most famous, it is not alone.

article thumbnail

Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk

eSecurity Planet

The infected payload could be injected in Big Data files used to train AI. They tried to use the most realistic processes and cloud architectures to demonstrate the severity of the threat. The intent of the exploit is to poison the targeted AI models and associated analytics, making the whole data infrastructure ineffective.

Risk 120
article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. The rising reliance on cloud platforms creates an expanded attack surface for threat actors and adversarial nation-states to exploit.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems. Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations.

article thumbnail

Top 6 API Security Questions Answered

Security Boulevard

Question 4: Can Zero Trust Architecture Ensure API Protection? Zero trust architecture came as a welcome development to replace outdated security models that were ineffective in securing today’s application environments which comprise private and public cloud and on-premises data centers.