Remove Big data Remove Digital transformation Remove Firewall Remove Internet
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The Peloton, Experian and Capital One hacks reflect the challenge of balancing security with the fast pace of digital transformation. Many organizations, for instance, continue to rely heavily on legacy firewalls and WAFs, which, of course, is precisely where Capital One went wrong.

Big data 240
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. The path this San Mateo, CA-based vendor is trodding tells us a lot about the unfolding renaissance of SIEMs – and where it could take digital commerce.

Big data 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. And we’re in a nascent phase where clever advances are blossoming even as unprecedented data breaches arise in parallel. LW: Can you frame what’s going on with identities when it comes to digital transformation? LW: How big is this challenge?

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Here are my takeaways: Skills deficit Over the past 20 years, enterprises have shelled out small fortunes in order to stock their SOCs with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. Digital transformation has only exacerbated this security skills gap.

Big data 159
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

IBM’s recent data breach study shows how the cost of a data breach has risen 12% over the past five years and now costs $3.92 Changing the SIEM game To top it all off, digital transformation ( DX ) is making everything much more complex. million, on average. Talk more soon.

Big data 153
article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

The Industrial Internet of Things (IIoT) puts networked sensors and intelligent devices directly on the manufacturing floor to collect data, drive artificial intelligence and do predictive analytics. Overlooking IoT security challenges may interrupt company operations and negate the positive digital transformation effects.

article thumbnail

NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level

The Last Watchdog

Here are key takeaways: Security benefits Protect the data itself. Yet in the age of Big Data and digital transformation many organizations still don’t do this very well. Legacy perimeter defenses are rapidly losing efficacy as the landscape shifts to cloud computing and the Internet of Things.