article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

She then extracted the data to her local machine and openly bragged about her escapades in hacker forums, Twitter, and even via posts in her Github repositories — which led to her arrest by the FBI. The Peloton, Experian and Capital One hacks reflect the challenge of balancing security with the fast pace of digital transformation.

Big data 240
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Here are a few takeaways: Very Big Data. And now, Big Data is about to become Very Big Data. Coming of age.

Big data 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

Digital Transformation. MSS/PSS providers must take advantage of digital transformation initiatives by observing clients’ current situations and being trusted advisors through consulting and value-added services to help them embrace digitalization […]. Onboarding and operational capacity.

Marketing 247
article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

The digital transformation initiatives have shifted the technology landscape and introduced new threats and risks. The CipherTrust Manager can also be rooted to a hardware security module (HSM) such as Thales Luna and Luna Cloud HSM. Cyber incidents pose a threat to the stability of the global financial system.

Banking 114