Remove Digital transformation Remove Media Remove Technology
article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

If you haven’t heard, we are undergoing “digital transformation.” Digital advances are coming at us fast and furious. The most recent example comes from Timehop, a service that enables social media users to plug into their past. Companies are in a honeymoon period with digital transformation.

article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

In fact, API stands for Application Programming Interface, the indispensable technology that makes it possible for software applications to exchange data across the Internet. APIs have been a cornerstone of our digital economy from the start. Related: Cross-site scripting threat heats up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Aptori’s AI-driven platform reduces risk, ensures compliance — now on Google Marketplace

The Last Watchdog

Unlike conventional tools, its proprietary semantic reasoning technology understands application logic and behavior in real-time, allowing it to detect complex security flawsincluding business logic vulnerabilities, API misconfigurations, and runtime threatsthat other solutions often miss. Users can learn more at [link].

Risk 130
article thumbnail

Cisco wins SC Media Award for “Best Security Company”

Cisco Security

SC Media has named Cisco the “Best Security Company” as part of its 2021 SC Awards. The SC Awards are the academy awards of the cybersecurity industry, and I couldn’t be prouder of this company, our Cisco Security team, and our amazing technology. Additional SC Awards.

Media 138
article thumbnail

GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news

The Last Watchdog

Cyber attackers have used misleading information on social media for procuring campaign finances as well as personal and financial information of people and corporations. Financial firms had to train their staff to deal with fraudulent online schemes and reports.

article thumbnail

Cyber Attackers Tap Cloud Native Technologies in Russia-Ukraine War

Security Boulevard

Cyber Attackers Tap Cloud Native Technologies in Russia-Ukraine War. Network and media organizations were attacked most often, Aqua said. This once again shows that today you don’t have to be a skilled hacker to take part in cyber war. ”. -- Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks , Aqua , March 15, 2022.

article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

Visitors walk by a cloud sign at the Telekom stand at the CeBIT 2017 Technology Trade Fair on March 21, 2017. New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud.