Remove Architecture Remove Digital transformation Remove Engineering Remove Firewall
article thumbnail

MY TAKE: How ‘CAASM’ can help security teams embrace complexity – instead of trying to tame it

The Last Watchdog

I sat down with Erkang Zheng, founder and CEO of JupiterOne , a Morrisville, NC-based CAASM platform provider, to discuss how security got left so far behind in digital transformation – and why getting attack surface management under control is an essential first step to catching up. But then along came digital transformation.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

Over the past year, I’ve had several deep conversations parsing how APIs have emerged as a two-edged sword: APIs accelerate digital transformation, but they also vastly expand the attack surface of modern business networks. Legacy security architectures just don’t fit this massively complex, highly dynamic environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Berkshire Bank Banks on Salt for API Protection

Security Boulevard

We have to keep our data secure and our regulators happy, and we can’t get in the way of digital transformation – Salt fits right into that,” said Melle. According to Ryan, “We considered other solutions, but they didn’t provide the range of capabilities we needed – we found the Salt architecture to be unique.

Banking 52
article thumbnail

Harmony on the Inside is the Key to Innovation from the Outside-In

Cisco Security

When the opportunity presented itself to lead Cisco’s Cloud and Network Security’s engineering team within the only organization able to unify and simplify the security access experience, there was clear alignment of ethos from the get-go. Leading an engineering team means working with people across geographies, experiences, and cultures.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

This will not only help better test the architectures that need to be prioritized, but it will provide all sides with a clear understanding of what is being tested and how it will be tested. Social engineering tests Social engineering is a technique used by cyber criminals to trick users into giving away credentials or sensitive information.

article thumbnail

Is your firewall stuck in the 80s?

Cisco Security

Modernize your firewall for greater security resilience. Cybersecurity has changed dramatically since the dawn of firewalls in the 1980s. Today’s workers, data, and applications are everywhere, and firewalls must be as well. So, can your firewall grow with you? The firewall is a critical foundation for security.

Firewall 144
article thumbnail

9 Best Secure Web Gateway Vendors for 2022

eSecurity Planet

Secure web gateways, then, provide fast, secure access to the Internet and SaaS, making digital business a safe and productive experience. During the pandemic, their importance has been amplified as organizations accelerate digital transformation efforts across cloud, SaaS, and mobility. Agent-based, proxy-free architecture.