Remove Cyber Risk Remove Digital transformation Remove Firewall Remove Technology
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. That said, a couple of prominent legacy technologies seem sure to endure as security cornerstones, moving forward. Many more Gordian-knot issues that need to be dealt with, to be sure.

Firewall 223
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Related: Why we’re in the Golden Age of cyber espionage. Enterprises have dumped small fortunes into stocking their SOCs (security operations centers) with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. But this hasn’t done the trick. Smart money.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Other security initiatives to leverage .

CISO 97
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. based supplier of networking technology. The core functionality of an API is to serve as a conduit for moving data to-and-fro in our digitally transformed world.

article thumbnail

RSAC insights: Sophos report dissects how improved tools, tactics stop ransomware attack

The Last Watchdog

Enterprises actually have access to plenty of robust security technology, as well as proven tactics and procedures, to detect and defuse even leading-edge, multi-layered attacks. Over the course of 14 days they installed an array of malware deep inside the firewall. From there the hackers moved laterally. Innovation evolution.

article thumbnail

Securing the edge with Zero Trust

CyberSecurity Insiders

It’s essential to distinguish that Zero Trust is not a technology and a holistic approach to network security. Automated technology is a necessary tool for obtaining access, scanning and assessing threats, adapting to behavior changes, and continually re-evaluating confidence in communications. Implementing Zero Trust.

article thumbnail

9 Best Secure Web Gateway Vendors for 2022

eSecurity Planet

Secure web gateways, then, provide fast, secure access to the Internet and SaaS, making digital business a safe and productive experience. During the pandemic, their importance has been amplified as organizations accelerate digital transformation efforts across cloud, SaaS, and mobility. Top Secure Web Gateways.