article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. million (NIST, WEF). Acohido Pulitzer Prize-winning business journalist Byron V.

article thumbnail

Digital transformation explained

CyberSecurity Insiders

No matter what sector your organization does business in, you’ve probably heard the term digital transformation. In every industry, digital transformation is going to be critical to remain competitive and resilient. But what does digital transformation mean? What is digital transformation?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. All the new points of sale (POS) and customer touchpoints increase the access points that bad actors can exploit.

article thumbnail

Asset management in the age of digital transformation

CyberSecurity Insiders

Over the past year or so, organizations have rapidly accelerated their digital transformation by employing technologies like cloud and containers to support the shift to IoT and address the expanding remote workforce. The post Asset management in the age of digital transformation appeared first on Cybersecurity Insiders.

article thumbnail

Digital transformation moves application security to the top of mind list!

CyberSecurity Insiders

The post Digital transformation moves application security to the top of mind list! Read full post. appeared first on Cybersecurity Insiders.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

Consolidate For A Secure Digital Transformation

Trend Micro

The expedited move to digital transformation has been a lifeline for organizations during the pandemic. Now that these investments have been made, what’s next to continue to drive operational improvements?