Remove Digital transformation Remove Firewall Remove Hacking
article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

Companies are being compelled to embrace digital transformation, or DX , if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high velocity. A core security challenge confronts just about every company today.

article thumbnail

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

The Last Watchdog

Related: Micro-segmentation taken to the personal device level The flip side, of course, is that an already wide-open attack surface – one that has been getting plundered for the past two decades by criminal hacking groups — is getting scaled up, as well. For a full drill down on our conversation, give the accompanying podcast a listen.

Firewall 149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

This surge in TLS abuse has shifted the security community’s focus back to a venerable network security tool, the firewall. In short, TLS helps preserve the integrity of legitimate digital connections. Hacking rings are using TLS to evade detection while delivering botnet commands, embedding malware and exfiltrating data.

Malware 214
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged network breach and you’ll invariably find memory hacking at the core. Here’s what I took away from our discussion: Transient hacks. This quickly gets intricately technical. Branching attacks.

Hacking 212
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

Over the past year, I’ve had several deep conversations parsing how APIs have emerged as a two-edged sword: APIs accelerate digital transformation, but they also vastly expand the attack surface of modern business networks. The kingpins of the top criminal hacking collectives are no dummies. Attack chain multiplier.

article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. Related article: How DevOps contributed to the Uber hack. Much like the recent hacks of Uber and Tesla, the Timehop caper revolved around the attackers manipulating admin credentials and maneuvering extensively through Timehop’s cloud environment.

article thumbnail

Q&A: How your typing and screen swiping nuances can verify your identity

The Last Watchdog

Related podcast: Why identities are the new firewall. And with “digital transformation” accelerating, there are so many more weakly-secured login accounts just waiting to be maliciously manipulated. Your password could easily be hacked, but your typing speed and style are unique, just like your fingerprints.