Remove Architecture Remove Digital transformation Remove Internet Remove Software
article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

Companies are being compelled to embrace digital transformation, or DX , if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high velocity. Related : Can serverless computing plus GitOps lock down DX?

article thumbnail

C3.ai Digital Transformation Institute Announces AI for Energy and Climate Security Grantees

CyberSecurity Insiders

ai Digital Transformation Institute ( C3.ai ai DTI awards, focused on using artificial intelligence (AI) techniques and digital transformation to advance energy efficiency and lead the way to a lower-carbon, higher-efficiency economy that will ensure energy and climate security. ai Digital Transformation Institute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How ‘CAASM’ can help security teams embrace complexity – instead of trying to tame it

The Last Watchdog

The shift to software-defined everything and reliance on IT infrastructure scattered across the Internet has boosted corporate productivity rather spectacularly. But then along came digital transformation. Internal and external network boundaries gave way to agile software development and everything-as-a-hosted-service.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs.

article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

This is more so true as organizations accelerate cloud migration and dive deeper into an interconnected digital ecosystem. Software-defined everything is the mantra and mushrooming complexity is the result. These gaps must be closed or digital transformation will be in danger of stalling out.

article thumbnail

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

Software developers are king of the hill; they are the deeply-committed disciples pursuing wide open, highly dynamic creative processes set forth in the gospels of DevOps and CI/CD. In this heady environment, the idea of attempting to infuse a dollop of security into new software products — from inception — seems almost quaint.

article thumbnail

Episode 147: Forty Year Old GPS Satellites offer a Warning about securing the Internet of Things

The Security Ledger

A programming glitch in GPS satellite software grounded planes in China and other countries. But what does it tell us about the security of the Internet of Things? The post Episode 147: Forty Year Old GPS Satellites offer a Warning about securing the Internet of Things appeared first on The Security. Read the whole entry. »