Remove Architecture Remove Digital transformation Remove Engineering
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

LW: Looking just ahead, which new security platforms or architectures do you expect to emerge as cornerstones? They’re not AI engineers. But they are sitting on a lot of very valuable customer data and already have the integrations and relationships to drive transformational impact to their customers.

article thumbnail

How Do You Secure Digital Transformation?

SecureWorld News

It is very likely that the COVID-19 pandemic forced your organization to accelerate its digital transformation (DX) strategies. There are a lot of lingering questions: What do organizations do to transform their infrastructure to where it needs to be from a technology standpoint? How do you secure your new initiatives?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How ‘CAASM’ can help security teams embrace complexity – instead of trying to tame it

The Last Watchdog

I sat down with Erkang Zheng, founder and CEO of JupiterOne , a Morrisville, NC-based CAASM platform provider, to discuss how security got left so far behind in digital transformation – and why getting attack surface management under control is an essential first step to catching up. But then along came digital transformation.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

Over the past year, I’ve had several deep conversations parsing how APIs have emerged as a two-edged sword: APIs accelerate digital transformation, but they also vastly expand the attack surface of modern business networks. Legacy security architectures just don’t fit this massively complex, highly dynamic environment.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Cyberattacks and data breaches will continue to arise because of credential theft, social engineering (phishing, smishing, vishing etc), vulnerabilities in third party software and supply chain processes, forged or stolen machine identities, and misconfigured cloud computing. Digital transformation. Types of attacks.

article thumbnail

New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises

CyberSecurity Insiders

2021 Research Highlights Growing Security Vulnerabilities Around Targeted Social Engineering, Ransomware and Malware Attacks. Respondents indicated that social engineering (75%), ransomware (74%), and malware (60%) are the most concerning attack vectors and are often used to exploit users accessing VPNs. Zscaler, Inc. About Zscaler.

VPN 125
article thumbnail

News alert: Zluri raises $20M funding round for SaaS management as identity features take off

The Last Watchdog

Alongside this, the unstoppable wave of enterprise digital transformation, led by generative AI, swift cloud adoption, and the rise of distributed remote workforces, is ushering in a new era of complexity in SaaS operations. About Zluri.

Marketing 188