Remove Authentication Remove Digital transformation Remove Hacking Remove IoT
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. Related: IoT exposures explained I’ve conversed several times with Jeff Hudson about this. This is how cool new digital services are getting spun up at high velocity.

article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Automating PKI certificate management alleviates outages caused by boom

The Last Watchdog

PKI and digital certificates were pivotal in the formation of the commercial Internet, maturing in parallel with ecommerce. Digital certificates get issued publicly, by a CA, or privately by an individual company for users and servers. This is how we authenticate human and machine identities and move encrypted data between endpoints.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

APIs are the snippets of code that interconnect the underlying components of all the digital services we can’t seem to live without. Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. API hacking escapades. Dearth of planning.

Big data 240
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Digital Transformation In 2024, several trends are expected to shape the landscape of digital transformation. Cloud-native technologies like containerisation and serverless computing will continue to gain traction, enabling scalability and cost-effectiveness in managing digital infrastructure.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

TLS is a component of the Public Key Infrastructure, or PKI , the system used to encrypt data, as well as to authenticate individual users and the web servers they log onto. In short, TLS helps preserve the integrity of legitimate digital connections. Here are the key takeaways: Surprise packages. I’ll keep watch and keep reporting.

Malware 214
article thumbnail

Understanding Florida’s water treatment hack, and how to stop future attacks

SC Magazine

Unfortunately, hasty digital transformations left behind a patchwork of remote access capabilities vulnerable to exploit, particularly in operational technology (OT) environments. Reliance on the machine-level password, with no requirement for user-level authentication. A Windows machine with a weak machine-level password.

Hacking 75