Remove Cyber Risk Remove Cybersecurity Remove Digital transformation Remove Firewall
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. The intensely competitive cybersecurity talent market is partly to blame here.

Firewall 223
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Related: Why we’re in the Golden Age of cyber espionage. Enterprises have dumped small fortunes into stocking their SOCs (security operations centers) with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. But this hasn’t done the trick. Smart money.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Bindu Sundaresan , director at AT&T Cybersecurity .

CISO 97
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. The core functionality of an API is to serve as a conduit for moving data to-and-fro in our digitally transformed world. based supplier of networking technology.

article thumbnail

Time to Accept the Risk of Open Source?

Security Boulevard

Time to Accept the Risk of Open Source? Where is the real risk? Accepting Open Source Risk. Accepting cybersecurity risk has become the norm for organizations. That depends on the source components, exposure to code injections from malicious actors, and other cyber risks from hackers.

Risk 109
article thumbnail

RSAC insights: Sophos report dissects how improved tools, tactics stop ransomware attack

The Last Watchdog

Related: DHS embarks on 60-day cybersecurity sprints. It’s clear to me that cybersecurity technical innovation and supporting frameworks, which includes wider threat intelligence sharing, are taking hold and making a material difference, albeit incrementally. From there the hackers moved laterally. Schiappa. “We

article thumbnail

Securing the edge with Zero Trust

CyberSecurity Insiders

A Zero Trust cybersecurity approach removes the assumption of trust from users and networks. Organizations must approach a Zero Trust cybersecurity model with the tenet that any endpoint connecting to a network should not be trusted by default. The post Securing the edge with Zero Trust appeared first on Cybersecurity Insiders.