Remove Banking Remove Digital transformation Remove Security Intelligence
article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

9 Considerations For Hong Kong Banks To Address The STDB Guidelines. The digital transformation initiatives have shifted the technology landscape and introduced new threats and risks. The Live Data Transformation extension is available for CipherTrust Transparent Encryption, providing zero-downtime encryption and data rekeying.

Banking 114
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Thompson was thus able to manipulate APIs and command line interfaces (CLIs) to a number of bank systems, including S3 buckets holding valuable data. The Peloton, Experian and Capital One hacks reflect the challenge of balancing security with the fast pace of digital transformation. Runtime vigilance.

Big data 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper. Exabeam is a bold upstart in the SIEM space.

Big data 157
article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures to a minimum level. One big muddle revolves around the so-called “ shared responsibility ” security model, espoused by Amazon, Microsoft and Google.

article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

2020 may have been the year of establishing remote connectivity and addressing the cybersecurity skills gap, but 2021 presented security experts, government officials and businesses with a series of unpresented challenges. As more learning, shopping and personal banking is conducted online, consumers could face identity and financial theft.

article thumbnail

Hackers Also Have Financial Reporting And Quotas :)

Security Boulevard

Chief Hacking Officer: Yevi, where are you at with London bank hack?”. Security kinda tough get inside.”. The spending on cybersecurity tools, security staff, upgrade of the security operations center, and security awareness training is an aggregation of efforts to reduce the organization’s overall risk posture.

Hacking 84