article thumbnail

Safeguarding the company’s risk profile after a hasty digital transformation

SC Magazine

Now that we are a full year into the new world order and the pandemic has eased up a bit, companies are taking a deep breath and starting to consider how the past 14 months fundamentally reshaped their digital transformation plans. Ben Smith, field chief technology officer, RSA.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Each key, in turn, can be configured to enable access to a dataset only under certain conditions, i.e. if certain attributes are present.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. The cloud presents a dual risk. Related: CASBs needed now, more than ever. Deepening services. It creates many more possible ways to get at a company’s systems and data.

article thumbnail

Identities, Risk and the Multi-Cloud Environment

Security Boulevard

More organizations are moving applications into the cloud, and a multi-cloud environment offers better redundancy and availability, as well as pushes forward digital transformation. However, identity management presents a challenge to organizations adopting multi-clouds, according to research by Strata Identity.

Risk 52
article thumbnail

New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises

CyberSecurity Insiders

To download the full study, see the Zscaler 2021 VPN Risk Report. However, the increased demand for remote work solutions, a shift to the cloud, and advancements in digital transformation have uncovered increased incompatibility between VPNs and true zero-trust security architectures. About Zscaler. Media Contacts.

VPN 125
article thumbnail

Why red team exercises for AI should be on a CISO's radar

CSO Magazine

AI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open yet another threat surface that CISOs and risk professionals will have to keep tabs on. Fundamental to managing AI risks will be threat modeling and testing for weaknesses in AI deployments.

CISO 106
article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? Risk is not what happens or occurs after that risk materializes. The speakers also delve into notable topics about what risk is, what it is not, and how to analyze potential risks. A Data-Driven World and Navigating It.