Remove Accountability Remove Digital transformation Remove Firewall
article thumbnail

MY TAKE: Here’s why identities are the true firewalls, especially as digital transformation unfolds

The Last Watchdog

In today’s digitally transformed environment, companies must monitor and defend systems housed on-premises and in overlapping public and private clouds. And they must account for employees, partners and customers using their smartphones to log in from Timbuktu. The concept of the firewall has changed,” Foust maintains.

article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

Companies are being compelled to embrace digital transformation, or DX , if for no other reason than the fear of being left behind as competitors leverage microservices, containers and cloud infrastructure to spin-up software innovation at high velocity. A core security challenge confronts just about every company today.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

If you’re not familiar with how Facebook, Twitter and YouTube make it so easy for you and me to easily access cool content they’ve collected and stored behind their respective firewalls, then you might think “API” is a trendy type of beer. Without them, social media and software-as-a-service, as we’ve come to know them, wouldn’t exist.

article thumbnail

Q&A: How your typing and screen swiping nuances can verify your identity

The Last Watchdog

Related podcast: Why identities are the new firewall. Compromised accounts came into play in data breaches of Uber, Tesla, Gemalto, Aviva, Equifax and many others. And with “digital transformation” accelerating, there are so many more weakly-secured login accounts just waiting to be maliciously manipulated.

article thumbnail

The AI Bot Epidemic: The Imperva 2025 Bad Bot Report

Thales Cloud Protection & Licensing

As automated traffic accounts for more than half of all web activity, organizations face heightened risks from bad bots, which are becoming more prolific every day. Simple, high-volume attacks have soared, now accounting for 45% of all bot attacks, compared to only 40% in 2023.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

In this fast-evolving, digitally-transformed, business environment, enterprises in 2018 will spend a record $3.8 Two thirds of the large enterprises recently surveyed by 451 Research and Digital Guardian reported maintaining as many as five endpoint security services, and one in 10 respondents dealt with as many as 10 solutions.

Antivirus 174
article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. As such, Hudson argues persuasively that the root of the matter comes down to the need for organizations to keep a much closer account of access logons and encryption keys. LW: Can you frame what’s going on with identities when it comes to digital transformation?