Remove Digital transformation Remove Firewall Remove System Administration Remove Technology
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library.

Firewall 223
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. Today there exists a widening shortage of security analysts talented and battle tested enough to make sense of the rising tide of data logs inundating their SIEM systems.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Last Watchdog recently sat down with Satya Gupta, founder and CTO of Virsec , a San Jose-based supplier of advanced data protection systems. Virsec is a leading innovator of memory protection technologies. From here, it’s possible to hijack control over application servers, access databases, or use APIs to connect to other systems.”.

Hacking 212
article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

IIoT transforms traditional, linear manufacturing supply chains into dynamic, interconnected systems that can more readily incorporate ecosystem partners. Overlooking IoT security challenges may interrupt company operations and negate the positive digital transformation effects.