article thumbnail

MY TAKE: How ‘CAASM’ can help security teams embrace complexity – instead of trying to tame it

The Last Watchdog

I sat down with Erkang Zheng, founder and CEO of JupiterOne , a Morrisville, NC-based CAASM platform provider, to discuss how security got left so far behind in digital transformation – and why getting attack surface management under control is an essential first step to catching up. But then along came digital transformation.

article thumbnail

Why companies need a Chief Product Security Officer

SC Magazine

Digital transformation has changed the way companies do business, which has in turn changed the way consumers interact with the products and services companies provide. Because they are becoming dependent on secure software engineering to operate their businesses, every company across sectors needs a CPSO.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

The Last Watchdog

This seems very basic, yet it is something many organizations in the throes of digital transformation have left in disarray. The leading MSSPs today typically maintain crack teams of inhouse analysts and engineers myopically focused on understanding and mitigating emerging cyber threats.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

APIs are the glue that keeps digital transformation intact and steamrolling forward. APIs have been a cornerstone of our digital economy from the start. Today APIs are empowering companies to speed up complex software development projects – as part of digital transformation. Big white elephant.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

Over the past year, I’ve had several deep conversations parsing how APIs have emerged as a two-edged sword: APIs accelerate digital transformation, but they also vastly expand the attack surface of modern business networks. -based supplier of networking technology. organizations and 60,000 German entities.

article thumbnail

Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs

The Last Watchdog

That said, there is one venerable technology – web application firewalls ( WAFs) – that is emerging as a perfect fit for SMBs in today’s environment, as all companies shift to a deeper reliance on cloud services and mobile apps. Fast forward to the current era of digital transformation.

Mobile 214
article thumbnail

MY TAKE: Here’s why identities are the true firewalls, especially as digital transformation unfolds

The Last Watchdog

In today’s digitally transformed environment, companies must monitor and defend systems housed on-premises and in overlapping public and private clouds. The concept of the firewall has changed,” Foust maintains. Now identity is the new firewall; identity is the boundary that must be protected. Unified access.