Remove 2018 Remove Digital transformation Remove Internet
article thumbnail

Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

The Last Watchdog

Distributed denial of service (DDoS) attacks continue to erupt all across the Internet showing not the faintest hint of leveling off, much less declining, any time soon. Related video: How DDoS attacks leverage the Internet’s DNA. This is borne out by Akamai Technologies’ Summer 2018 Internet Security/Web Attack Report.

DDOS 255
article thumbnail

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

The Last Watchdog

It’s the glue holding digital transformation together. Related: A primer on ‘credential stuffing’ APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere in the digital landscape, and more are being created every minute. I’ll keep watch.

Mobile 266
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Established and emerging technologies to watch out for in 2018

Thales Cloud Protection & Licensing

Cloud computing has gone mainstream for many enterprises, and the Internet of Things (IoT) is changing how both industrial and consumer-oriented companies do business. Looking to the new year however, which trends will come to define our industry in 2018 and beyond? Shift towards micro-services. Resurrection of established tech.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

It was a reflection of attackers moving to take full advantage of the fresh attack vectors cropping up as companies retooled their legacy networks – comprised of ‘on-premises’ servers and clients – to operate in the expanding world of cloud services, mobile devices and the Internet of Things. Here are a few big takeaways: Smarter spending.

Antivirus 174
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. Now toss in the fact that digital transformation is redoubling software development and data handling complexities.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Without APIs there would be no cloud computing, no social media, no Internet of Things. APIs are the glue that keeps digital transformation intact and steamrolling forward. APIs have been a cornerstone of our digital economy from the start. But APIs also comprise a vast and continually-expanding attack surface.

article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. Nucleus launched in 2018 and has grown to over 50 employees. Digital transformation has spawned a cascade of nuanced, abstract vulnerabilities – and they’re everywhere.

Risk 235