Remove Cyber Risk Remove Data breaches Remove Digital transformation Remove IoT
article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

Companies are pursuing digital transformation at all costs. But do they really understand the risks lurking in their digital transformation strategies? » Related Stories Report: Companies Still Grappling with IoT Security Podcast Episode 141: Massive Data Breaches Just Keep Happening. . »

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Just like in previous years, 2024 is set to test practitioners’ skills as the frequency of cyber threats continues to surge leaving no room for complacency. Digital Transformation In 2024, several trends are expected to shape the landscape of digital transformation. IOT attacks aren’t showing any signs of slowing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Enterprises, especially, tend to be methodical and plodding.

article thumbnail

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

The Last Watchdog

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Using this technique, the criminal collects your leaked credentials (usually stolen in a data breach) and then applies them to a host of other accounts, hoping they unlock more. Hackers count on it.

Big data 164
article thumbnail

RSAC insights: Sophos report dissects how improved tools, tactics stop ransomware attack

The Last Watchdog

This brings up a point: for every massive data breach or high-profile ransomware caper that grabs headlines, I’m starting to hear about more instances like this, where the good guys prevail. At the same time, more organizations are taking cyber risk mitigation as seriously as they should.

article thumbnail

Enterprise Secrets Management Explained: Best Practices, Challenges, and Tool Selection

Thales Cloud Protection & Licensing

These secrets control data access when transferred between applications—sending information from a webpage, making a secure request to an API, accessing a cloud database, or countless other cases that modern enterprises encounter while pursuing digital transformation and increasing automation.