Remove Architecture Remove Cyber Risk Remove Digital transformation
article thumbnail

Pondurance Launches Cyber Risk Assessments Powered by MyCyberScorecard

CyberSecurity Insiders

INDIANAPOLIS–( BUSINESS WIRE )– Pondurance , a leader in Managed Detection and Response (MDR) services, today launched Cyber Risk Assessments powered by MyCyberScorecard. Roadmaps to cyber resilience. Cloud-delivered modern SaaS architecture. Hundreds of built-in security and compliance policies.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs.

Mobile 266
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. The core functionality of an API is to serve as a conduit for moving data to-and-fro in our digitally transformed world. based supplier of networking technology.

article thumbnail

AT&T teams with Cisco to create new managed SASE offering

CyberSecurity Insiders

Whether organizations call it digital transformation or just using technology to create opportunities for new, easier ways to work, one thing is certain. Each component offers up crucial functions to enable users to connect to resources while controlling cyber risk along the way: AT&T SD-WAN with Cisco.

article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Digital transformation is all about high-velocity innovation and on-the-fly change.

article thumbnail

Securing the edge with Zero Trust

CyberSecurity Insiders

This requires data-level protections, a robust identity architecture, and strategic micro-segmentation to create granular trust zones around an Organization’s digital resources. Everyone can agree that implementing a Zero Trust Architecture can stop data breaches. The Zero Trust journey. Implementing Zero Trust.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Prior to joining Collins, Alexandra led Booz Allen’s Commercial Aerospace practice, building and overseeing multi-disciplinary teams to advise C-level clients on cybersecurity and digital transformation initiatives. Director, Industry Solutions Americas Solutions Architecture & Customer Success. Elizabeth Moon.