Remove Cyber Risk Remove Digital transformation Remove Internet Remove IoT
article thumbnail

Digital Transformation Frameworks for Cyber Risk Teams

Security Boulevard

Businesses are embracing digital transformation to drive agility and ensure their success in a digital-first economy. This includes adapting to digital technologies like the cloud and the Internet of Things (IoT) as part of their transformation strategies.

article thumbnail

Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk

The Security Ledger

In this Spotlight* podcast, Sayed Wajahat Ali the Senior Director of Security Risk Management at DU TELECOM in the UAE joins us to talk about how digital transformation is shaking up the once-staid telecommunications industry and how his company is staying on top of both the risks and opportunities created by digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs. API complexity.

article thumbnail

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

But what new kinds of Internet of Things use cases may become possible? And, just as important, what are the security implications of massively distributed IoT endpoints connected to capacious 5G cellular infrastructure? But what new kinds of Internet of Things use cases may become possible? Read the whole entry. »

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Teeming threat landscape Security leaders’ key priority is reducing exposures to the cyber risks they know are multiplying.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. In the early days of the Internet, coders created new programs for the sake of writing good code, then made it available for anyone to use and extend, license free.

Firewall 223
article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Digital transformation is all about high-velocity innovation and on-the-fly change.