Remove Digital transformation Remove Firewall Remove Internet Remove Mobile
article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

If you’re not familiar with how Facebook, Twitter and YouTube make it so easy for you and me to easily access cool content they’ve collected and stored behind their respective firewalls, then you might think “API” is a trendy type of beer. APIs have been a cornerstone of our digital economy from the start.

article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. CASBs began by closing glaring security gaps created by the rapid adoption of mobile devices and cloud tools. Related: CASBs needed now, more than ever. This is especially important within the cloud. Talk more soon.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. In the early days of the Internet, coders created new programs for the sake of writing good code, then made it available for anyone to use and extend, license free.

Firewall 223
article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs. API complexity. Tool limitations.

article thumbnail

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

The Last Watchdog

Distributing blacklists of known malicious IP addresses and URLs at a deeper level results in a significantly cleaned-up signal getting passed on to systems sitting higher up the security stack, such as next-gen and web app firewalls, intrusion detection and prevention tools and SIEM systems. “By I’ll keep watch. Talk more soon.

article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. LW: Can you frame what’s going on with identities when it comes to digital transformation? The actors on digitally transformed networks come from two realms: people and machines. Venafi is a leading supplier of machine identity protection.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. Related: The ‘Golden Age’ of cyber espionage is upon us.