article thumbnail

Cyber Attackers Tap Cloud Native Technologies in Russia-Ukraine War

Security Boulevard

Cyber Attackers Tap Cloud Native Technologies in Russia-Ukraine War. This once again shows that today you don’t have to be a skilled hacker to take part in cyber war. ”. -- Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks , Aqua , March 15, 2022. Tale of 3 Clouds eBook: How Venafi Creates Digital Transformation. ".

article thumbnail

Creating a Path to Successful Security Hygiene

Cisco Security

Firms are also deploying new types of devices as part of digital transformation initiatives, further exacerbating the growing attack surface, leading to management challenges, vulnerabilities, and potential system compromises. There’s a growing need to secure the perimeter while simplifying the technologies that do so.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How can banks succeed in the digital banking era?

Thales Cloud Protection & Licensing

To compete, financial institutions are investing heavily in digital transformation. Banks have adopted technologies to enable: Secure, remote, multi-device banking transactions. Secure digital payments leveraging biometrics, tokens, and context-based security. Accelerating digital transformation.

Banking 71
article thumbnail

Win the connected and autonomous car race while protecting data privacy

Thales Cloud Protection & Licensing

Digital revolution in the automobile industry. Accelerate digital transformation by reducing risk, complexity, and cost. Nevertheless, they create major privacy and data protection vulnerabilities.

article thumbnail

Rogue Certificates and Shadow IT: The Underbelly of Digital Certificate Growth

Security Boulevard

Shadow IT is when someone in the organization connects hardware, software, or other Information Technology (IT) to the network without letting IT know. Along the way, those entities have found themselves increasingly relying on digital technology and services to serve their business requirements. UTM Medium. UTM Source.

article thumbnail

What Security Controls Do I Need for My Kubernetes Cluster?

Security Boulevard

However, as with any technology, new security concerns are emerging. Tale of 3 Clouds eBook: How Venafi Creates Digital Transformation. With increased adoption, heightened risks. The majority (88%) of IT decision makers are exploring Kubernetes and containers, according to 2021 data from New Relic. UTM Medium. UTM Source.

article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

We asked Christos how he was able to align security resilience considering the digital transformation. It is in constant, diligent, and persistent methods that your legacy systems will improve from their current capabilities to where they need to be to secure the technology of today.

CISO 90