Remove Digital transformation Remove Internet Remove Software Remove Technology
article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Related: Cyber spies feast on government shut down.

article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

If you haven’t heard, we are undergoing “digital transformation.” Digital advances are coming at us fast and furious. Misuse and manipulation of machine identities almost certainly is coming into play in the type of deep breaches digitally-transformed organizations are now experiencing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

In fact, API stands for Application Programming Interface, the indispensable technology that makes it possible for software applications to exchange data across the Internet. APIs have been a cornerstone of our digital economy from the start. Think of APIs as the software connectors that permit applications to interact.

article thumbnail

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Related: Digital Transformation gives SIEMs a second wind After an initial failure to live up to their overhyped potential, SIEMs are perfectly placed to play a much bigger role today. Digital transformation is leading to more intensive use of the cloud, faster development of software to support it, and the growth of the IoT.

IoT 179
article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

Companies are being compelled to embrace digital transformation, or DX , if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high velocity. Related : Can serverless computing plus GitOps lock down DX?

article thumbnail

C3.ai Digital Transformation Institute Announces AI for Energy and Climate Security Grantees

CyberSecurity Insiders

ai Digital Transformation Institute ( C3.ai ai DTI awards, focused on using artificial intelligence (AI) techniques and digital transformation to advance energy efficiency and lead the way to a lower-carbon, higher-efficiency economy that will ensure energy and climate security. URBANA, Ill. & & BERKELEY, Calif.–(

article thumbnail

Your Guide to Cloud Security Technologies

Security Boulevard

Cloud computing refers to the delivery of multiple services via the internet (also known as the “cloud”), including software, databases, servers, storage, intelligence, and analytics. The post Your Guide to Cloud Security Technologies appeared first on Security Boulevard.