article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Each key, in turn, can be configured to enable access to a dataset only under certain conditions, i.e. if certain attributes are present.

article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. The cloud presents a dual risk. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be. Related: CASBs needed now, more than ever. Deepening services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. So be careful out there. I’ll keep watch and keep reporting. Acohido Pulitzer Prize-winning business journalist Byron V.

Mobile 200
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

Here are a few other snippets from her presentation, but you'll have to register and join to hear her full insightful talk and take in the rest of both days' great speaker lineup. "We Don't miss Kathleen Moriarty's complete presentation, as well as those of other cybersecurity leaders, at our upcoming digital events.

InfoSec 77
article thumbnail

How Businesses Can Better Manage a Growing Attack Surface

CyberSecurity Insiders

The external attack surface of companies continues to grow, presenting threat actors with a larger opportunity to gain access to exposed assets. This increased exposure has enhanced the need for Attack Surface Management (ASM) solutions, which provide organizations with comprehensive insight into their Internet-exposed assets.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. In the early days of the Internet, coders created new programs for the sake of writing good code, then made it available for anyone to use and extend, license free.

Firewall 223
article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. Encryption is an arcane science that has long presented an irresistible challenge to the best and brightest researchers. Refer: The vital role of basic research. Here are the key takeaways: PKI basics. I’ll keep watch, and keep reporting.