article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud. The Netwrix team found that these challenges are exacerbated by business demands for speedy digital transformation.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Cyber defense should be part of every power grid’s digital transformation strategy–not only to ensure the power generation and reliability of the grid, but also to protect sensitive or private data. Best Practices to Secure Critical Infrastructure. All these measures are considered best practices for data protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library.

Firewall 218
article thumbnail

How to Overcome Common SSH Machine Identity Risks with Automation

Security Boulevard

Higher levels of automation for system administrators. Digital Transformation Fails without Machine Identity Management. CyberArk and Venafi teamed up to offer an integrated solution for enterprise-wide governance and risk reduction by enabling easy and robust management of SSH keys. Better visibility for InfoSec teams.

Risk 52
article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. Related: Business-logic attacks target commercial websites. A few key takeaways: How SMBs got here.