Remove Cyber Risk Remove Digital transformation Remove Risk Remove System Administration
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library. Legacy tech’s role.

Firewall 224
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. Remote desktop risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Prior to joining Collins, Alexandra led Booz Allen’s Commercial Aerospace practice, building and overseeing multi-disciplinary teams to advise C-level clients on cybersecurity and digital transformation initiatives. During her first few years at Booz Allen, she supported technology, innovation and risk analysis initiatives across U.S.

article thumbnail

The Challenges in Building Digital Trust

SecureWorld News

System administrators didn't bother locking down their systems, because the possibility of bad actors using them didn't really cross their minds. I consider digital trust, just like cyber risk management, to be a team sport. It requires significant effort on the part of businesses as well as governments.