Remove Digital transformation Remove Document Remove IoT
article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. These new technologies are incredibly complex, often poorly documented, and change constantly. The deployment of APIs has expanded exponentially.

article thumbnail

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

The Security Ledger

The post Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion appeared first on The Security Ledger with Paul F. Since then, both the scale and applications of PKI have transformed. Click the icon below to listen.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Automating PKI certificate management alleviates outages caused by boom

The Last Watchdog

Related: A primer on advanced digital signatures. PKI and digital certificates were pivotal in the formation of the commercial Internet, maturing in parallel with ecommerce. Clearly, many companies need to get a better grip on PKI management simply to keep from derailing digital transformation.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Today we’re in the throes of digital transformation. Consider that just five years ago, a large enterprise was typically responsible for managing tens of thousands of digital certificates. Today that number for many organizations is pushing a million or more digital certificates, as digital transformation accelerates.

article thumbnail

IATA Cyber Regulations

Centraleyes

Recent amendments have focused on addressing vulnerabilities linked to digital transformation in aviation, such as the use of cloud technologies and IoT devices. What Are the Requirements for IATA Cyber Security Regulations?

Risk 52
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

APIs are the snippets of code that interconnect the underlying components of all the digital services we can’t seem to live without. Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. API vulnerabilities are ubiquitous and multiplying; they’re turning up everywhere.

Big data 240
article thumbnail

ENISA Threat Landscape Report 2020

Security Affairs

Another element of concern is the diffusion of IoT devices , in many cases, smart objects are exposed online without protection. Below the main trends reported in the document: Attack surface in cybersecurity continues to expand as we are entering a new phase of the digital transformation.