Remove Cybersecurity Remove Digital transformation Remove Internet Remove System Administration
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. The intensely competitive cybersecurity talent market is partly to blame here.

Firewall 223
article thumbnail

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

The Last Watchdog

Enter micro-segmentation; or microsegmentation, depending on which cybersecurity vendor you’re talking to. It gives system administrators a way to secure each microsegment, separately. Clearly agility and speed are cornerstones of digital transformation. DevOps has taken center stage. I’ll keep watch.

Firewall 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. There are a lot of moving parts to modern IT systems. This could be because of confusing cybersecurity marketing messages, Côté says.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

If you’re like millions of other Americans, your TV is connected to the Internet and uses technology generated from the nation’s power grid. But the energy sector also underpins our emergency and response systems, our hospitals and healthcare, our schools, our businesses, and virtually everything we do as a society.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

That’s Gartner’s estimate of global spending on cybersecurity in 2017 and 2018. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

Hacking 212
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

One of the promising cybersecurity trends that I’ve been keeping an eye on is this: SOAR continues to steadily mature. Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. Just ask Capital One , Marriott or Equifax.

Big data 159
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Leading-edge cybersecurity systems in service today apply machine learning in some amazing ways to help large enterprises identify and instantly respond to cyber threats.