article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud. The Netwrix team found that these challenges are exacerbated by business demands for speedy digital transformation.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

Log4j, aka Log4Shell, blasted a surgical light on the multiplying tiers of attack vectors arising from enterprises’ deepening reliance on open-source software. It’s notable that open-source software vulnerabilities comprise just one of several paths ripe for malicious manipulation. Related: The exposures created by API profileration.

Firewall 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Microsoft, supplier of the Windows operating system used ubiquitously in enterprise networks, recently disclosed that fully 70% of all security bugs pivot off what the software giant refers to as “memory safety issues.”. Thus, memory attacks unfold only when the application is executing, and then they disappear without a trace.

Hacking 212
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Digital transformation has only exacerbated this security skills gap. Rising implementations of cloud services and IoT systems, not to mention the arrival of 5G, has quickened the pace of software development and multiplied data handling complexities. Take PowerShell-enabled breaches, for instance.

Big data 159
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. To boost productivity, they must leverage cloud infrastructure and participate in agile software development. Related: How ‘PAM’ improves authentication.

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. For a drill down on our discussion, please give the accompanying podcast a listen. Here are the key takeaways: Cloud exposures.

article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

Overlooking IoT security challenges may interrupt company operations and negate the positive digital transformation effects. Clearly, traditional firewalls and antivirus systems will not be sufficient; the complex IIoT infrastructure demands something more advanced. Best Practices for Assuring the Software Supply Chain for IoT.