Remove Cyber Risk Remove Digital transformation Remove Hacking
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. They’ve been quick to recognize that all too many organizations have a limited understanding about these fresh cyber risks. By comparison, scant effort has gone into securing the latter.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. You need look no further that the jarring SolarWinds hack for a prime example. Along the way, of course, cybersecurity must get addressed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Meanwhile, while business logic hacks, supply chain holes, and cyber extortion continue to loom large. Attackers arent hacking in theyre logging in. Complex DevSecOps, APIs, and cloud integrations will become leading attack vectors, while insider threats and accidental disclosures drive data leakage risks.

article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? SecureWorld recently presented the webinar Cyber Risk: Stay Ahead of Evolving Threats With Proactive Collaboration with speakers representing Reciprocity, a leader in Governance, Risk, and Compliance Software (GRC).

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. The core functionality of an API is to serve as a conduit for moving data to-and-fro in our digitally transformed world. based supplier of networking technology.

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Teeming threat landscape Security leaders’ key priority is reducing exposures to the cyber risks they know are multiplying. Hacking collectives are already probing, if not exploiting, containers and APIs. Here are a few key takeaways.