article thumbnail

GUEST ESSAY: The case for acknowledging — and bridging — the security gap between IT vs OT

The Last Watchdog

The convergence of information technology (IT) and operational technology (OT) is a double-edged sword for critical infrastructure sectors – despite all its benefits, IT/OT convergence is not without its risks. It is important to realize that IT/OT convergence is just as much about the human element as it is about technology.

IoT 190
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Managed Security Service Providers (MSSPs)

eSecurity Planet

Gartner analyst Pete Shoard advised that being as clear as possible about your needs is key to selecting the right service, noting that offerings can range from managing a single technology to sharing the responsibility for operating a security platform to full outsourcing of security operations. DXC Technology.

Firewall 107
article thumbnail

Behavioral Analytics in Cybersecurity: Does It Work as Advertised?

eSecurity Planet

Whether it’s studying the performance of your direct competitors, using predictive analytics to determine what the future may hold for your industry, or analyzing employee performance and making optimization decisions based on that information, the entire point is to take data in and use it to make better-informed decisions.

article thumbnail

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

The Last Watchdog

Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the order of the day. It can help companies get in a much better position to defend against, or recover from, targeted exploits, such as APT probes , DDoS attacks or ransomware , he says.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Born from e-commerce giant Alibaba Group in Hangzhou, China, the cloud services provider offers content delivery networks (CDN), data storage, and relational database management in a scalable infrastructure. Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more.

Firewall 117
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

— had allegedly inserted hardware backdoors in technology sold to a number of American companies. Sager said he hadn’t heard anything about Supermicro specifically, but we chatted at length about the challenges of policing the technology supply chain. Below are some excerpts from our conversation. TS: Exactly.