article thumbnail

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

The Last Watchdog

It’s the glue holding digital transformation together. Related: A primer on ‘credential stuffing’ APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere in the digital landscape, and more are being created every minute. We spoke at RSA 2020.

Mobile 266
article thumbnail

The Digital Trust Factor. Have We Got It All Wrong?

Jane Frankland

Their research also underscores the correlation between high digital evolution, momentum, and user engagement, signifying the importance of seamless user experiences and consumer willingness to adopt new technologies. This makes sense, especially considering the relationship between trust, digital transformations and cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: How IABs — initial access brokers — help sustain, accelerate the ransomware plague

The Last Watchdog

Related: How cybercriminals leverage digital transformation. They’ve even got an escrow system to assure that one criminal is not scamming the other criminals.”. Understanding digital assets. This is the flip side of digital transformation.

article thumbnail

Cybersecurity CEO: 5 Cybercrime Trends to Watch for in 2021

Herjavec Group

At the onset of the year, we predicted that the top priority for any CISO or CIO will be to manage the risk associated with digital transformation and enhance their security programs in order to keep up with new technological complexity. Looking back, that was an understatement! .

article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

While the pandemic accelerated their digital transformation initiatives, it also expanded their threat surface and opened up opportunities for cybercriminals. In addition, telemedicine has generated a larger pool for potential phishing scams as well as other socially-engineered, and technically based, attacks (e.g., ransomware).

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. Related: The ‘Golden Age’ of cyber espionage is upon us.

article thumbnail

SME email security in 2022

CyberSecurity Insiders

A continued shift to remote working highlighted the importance of security in an era of digital transformation, and hopefully, business leaders have taken onboard the critical need for effective online protection, particularly where email security is concerned.