Remove Cloud Migration Remove IoT Remove Risk Remove Technology
article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

I recently had the chance to sit down with Kevin Simzer, chief operating officer of Trend Micro, to discuss two of them: Cloud Workload Protection Platform ( CWPP ) and Cloud Security Posture Management ( CSPM.) Here are the key takeaways: Cloud migration risks. It’s going to take a paradigm shift, Simzer says.

article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

I had an enlightening discussion about this with Dana Tamir, vice president of market strategy for Silverfort , a Tel Aviv-based supplier of multi-factor authentication technology. LW: What obstacles are companies running into with cloud migration? This becomes a barrier to cloud migration. We spoke at RSA 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

Because of this, companies in all industries were faced with an array of new technologies like cloud and containers that support the shift to edge computing and remote workers. A new approach to asset management is required to address the lack of visibility and security risks therein. What is cybersecurity asset management.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. Digital transformation is accelerating the pace at which new technologies are being adopted. IoT is forever changing the boundaries of the perimeter. are discovered.

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Teeming threat landscape Security leaders’ key priority is reducing exposures to the cyber risks they know are multiplying. Speed is what digital transformation is all about. Here are a few key takeaways.

article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk. Also with the increase in cloud, mobile, and IoT devices, a whole new generation of attack surfaces are vulnerable to hackers.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

Coordinating that many systems can, at a minimum, create operational complexity, but it can also increase the risk of errors or misconfigurations creating security gaps. These entities can be tangible, like IoT sensors, mobile devices as well as abstract infrastructures like containers and microservices. Machine Identity Management.