article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs – hacking, cybersecurity) She is also a regular writer at Bora.

article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

As businesses in every sector embrace digital transformation initiatives, adopting cloud computing, Internet of Things (IoT) devices, automation, AI, and interconnected ecosystems, their attack surface widens exponentially. She is also a regular writer at Bora.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: How your typing and screen swiping nuances can verify your identity

The Last Watchdog

And with “digital transformation” accelerating, there are so many more weakly-secured login accounts just waiting to be maliciously manipulated. The vast majority of these new, interconnected components and layers that make up digital transformation require login accounts, which translates into a fresh galaxy of attack vectors.

article thumbnail

5 API Vulnerabilities That Get Exploited by Criminals

Security Affairs

APIs, short for application programming interfaces, have become a common building block for digitally enabled organizations. They facilitate communication as well as critical business operations, and they also support important digital transformations. SecurityAffairs – hacking, API Vulnerabilities). Pierluigi Paganini.