Remove Digital transformation Remove Encryption Remove Firewall Remove Technology
article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

If you’re not familiar with how Facebook, Twitter and YouTube make it so easy for you and me to easily access cool content they’ve collected and stored behind their respective firewalls, then you might think “API” is a trendy type of beer. APIs got deployed into wide use without any meaningful authentication or use of encryption.

article thumbnail

Next-Generation Firewalls: A comprehensive guide for network security modernization

CyberSecurity Insiders

The terms computer security, information security and cybersecurity were practically non-existent in the 1980s, but believe it or not, firewalls have existed in some form since that time. Over the years, the traditional firewall has transformed to meet the demands of the modern workplace and adapt to an evolving threat landscape.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

The Last Watchdog

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. Related: Why Google’s HTTPS push is a good thing At the time, just 50 % of Internet traffic used encryption.

article thumbnail

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

CyberSecurity Insiders

Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation. Proven, reliable technology and services.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

This surge in TLS abuse has shifted the security community’s focus back to a venerable network security tool, the firewall. Attackers are taking advantage of TLS-protected web and cloud services, for malware delivery and for command-and-control, right under the noses of IT security teams and most security technologies.”.

Malware 214
article thumbnail

Thales + Imperva: Delivering the Next Generation of Data Security

Thales Cloud Protection & Licensing

Application Security : Mitigate against volumetric attacks with DDoS Protection, protect applications with Web Application Firewall (WAF), combat bad bots and online fraud with Advanced Bot Protection (ABP), discover and protect API endpoints with API Security, and secure the software supply chain with Runtime Application Self-Protection (RASP).

article thumbnail

MY TAKE: Deploying ‘machine learning’ at router level helps companies prepare for rise of 5G

The Last Watchdog

Machine learning (ML) and digital transformation (DX) go hand in glove. And as we accelerate the digitalization of everything, even more data is being generated. Analyzing encrypted traffic One area where Juniper is differentiating itself is in the area of encrypted traffic analysis.