article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud. The Netwrix team found that these challenges are exacerbated by business demands for speedy digital transformation.

article thumbnail

How to Overcome Common SSH Machine Identity Risks with Automation

Security Boulevard

How to Overcome Common SSH Machine Identity Risks with Automation. Collecting Risk Intelligence. Prevent breaches by automating the collection of risk intelligence required to quickly identify and respond to SSH machine identity risks, weaknesses or security events. Higher levels of automation for system administrators.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library. Legacy tech’s role.

Firewall 223
article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

To get an idea of how serious this problem might be, a 2015 report by the University of Cambridge Centre for Risk Studies estimated a major grid attack in the U.S. The March attack demonstrates that at least two utilities were poorly prepared for such an attack. It also makes me fear that few are. electrical grid is effectively attacked.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. Remote desktop risks.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Prior to joining Collins, Alexandra led Booz Allen’s Commercial Aerospace practice, building and overseeing multi-disciplinary teams to advise C-level clients on cybersecurity and digital transformation initiatives. During her first few years at Booz Allen, she supported technology, innovation and risk analysis initiatives across U.S.