article thumbnail

Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk

The Security Ledger

In this Spotlight* podcast, Sayed Wajahat Ali the Senior Director of Security Risk Management at DU TELECOM in the UAE joins us to talk about how digital transformation is shaking up the once-staid telecommunications industry and how his company is staying on top of both the risks and opportunities created by digital transformation.

article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. In the past, for example, companies could get away with using a default password, and depend on firewalls and other internal security tools to provide protection. Related: CASBs needed now, more than ever. Talk more soon.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

This is one giant leap towards getting rid of passwords entirely. Excising passwords as the security linchpin to digital services is long, long overdue. Password abuse at scale arose shortly after the decision got made in the 1990s to make shared secrets the basis for securing digital connections.

article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Meanwhile, 64 percent saw value in improving user experiences and 21 percent said it could help achieve digital transformation. Password abuse emerged as a criminal specialty shortly after the decision got made in the 1990s to jump start the commercial Internet using a security framework built on shared secrets.

article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

Related : SMBs are ill-equipped to deal with cyber threats Without a cohesive cybersecurity framework, SMBs are falling further behind as digital transformation, or DX, ramps up. Embracing digital transformation becomes even more of a challenge without a dedicated platform to address vulnerabilities. That’s our goal.”

article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. Digital transformation has spawned a cascade of nuanced, abstract vulnerabilities – and they’re everywhere. That’s changing — dramatically.

Risk 235
article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. LW: Can you frame what’s going on with identities when it comes to digital transformation? The actors on digitally transformed networks come from two realms: people and machines. Venafi is a leading supplier of machine identity protection.