article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Related: How Russia uses mobile apps to radicalize U.S. It was initially considered something that would illustrate a mobile application rather than cause damage. It’s clear that when technology develops, people find creative ways to cause mass disruption, increasing the need for antivirus protection and firewalls.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. Many organizations, for instance, continue to rely heavily on legacy firewalls and WAFs, which, of course, is precisely where Capital One went wrong. Traditional approaches just aren’t working or can’t scale.

Big data 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Ponemon chairman and founder Larry Ponemon said in a statement that “Most of the IT and security professionals regard their organizations as vulnerable to these attacks,” and that growing adoption of technologies such as cloud, mobile , big data , and the Internet of Things (IoT) are adding to that risk.

article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

I recently had a fascinating conversation with Jeff Hudson, CEO of Venafi , about why we are currently in a situation where criminally motivated actors are proving to be every bit as innovative as legitimate businesses, when it comes to leveraging cloud services, and developing breakthrough uses of mobile computing and the Internet of things.

article thumbnail

How to Prevent Data Breaches: Data Breach Prevention Tips

eSecurity Planet

Enlist Outside Help Do you have the internal resources to deal with attacks on mobile platforms, embedded systems, or Internet of Things devices? Examples of managed security services include: Threat hunting Detection and response Data loss prevention Firewalls 10.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

a world leader in memory products and technology solutions, is proud to announce it has won the following Global InfoSec Awards for its encrypted USB solutions family from Cyber Defense Magazine (CDM), the industry’s leading electronic information magazine: Data Loss Prevention Market Leader. Encryption Market Leader. Kingston Is With You.

InfoSec 40
article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD]. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.