Remove Digital transformation Remove Internet Remove IoT Remove Mobile
article thumbnail

Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk

The Security Ledger

In this Spotlight* podcast, Sayed Wajahat Ali the Senior Director of Security Risk Management at DU TELECOM in the UAE joins us to talk about how digital transformation is shaking up the once-staid telecommunications industry and how his company is staying on top of both the risks and opportunities created by digital transformation.

article thumbnail

Federal Government is Excelling at Digital Transformation While Security Challenges Gain Ground

Thales Cloud Protection & Licensing

government is excelling with digital transformation (DX) which is critical in this time of crisis as the cloud becomes a crucial dynamic with the world working remotely. New digital capabilities are enabling data to be more fully utilized. As the U.S. Some good news: the U.S. Business continuity depends on it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. Nonetheless, it is a pivotal chapter in the evolution of digital commerce. It can be as granular as a microservice in a software container connecting to a mobile app, for instance.

article thumbnail

BrandPost: Safeguarding your Connectivity Supply Chain

CSO Magazine

Connectivity supply chain is the term NETSCOUT uses for this attack surface because it is made up of all the technologies and services that enable companies and individuals to stay connected to the internet. To read this article in full, please click here

article thumbnail

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

The Security Ledger

The post Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion appeared first on The Security Ledger with Paul F. With the explosion of the Internet, PKI became a foundational technology for securing web traffic and authenticating users to applications via technologies like SSL and TLS. Click the icon below to listen.

IoT 98
article thumbnail

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

Wider use of Internet of Things systems that can make daily living safer, healthier and more convenient is on the immediate horizon. However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must first be quelled. Political leaders in the U.K. Can you frame where things stand?

IoT 158
article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs. API complexity.