Remove CSO Remove Digital transformation Remove Technology
article thumbnail

Top 8 cybersecurity predictions for 2022

CSO Magazine

While enterprises tout their efforts to accelerate digital transformation efforts, for security leaders in business there is a dark side to the rapid deployment of new technology. As global economies look to exit the pandemic chaos, there is a cloud of uncertainty around navigating the new normal.

article thumbnail

Spotlight: Traceable CSO Richard Bird on Securing the API Economy

The Security Ledger

In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. The post Spotlight: Traceable CSO Richard Bird on Securing the API Economy appeared first.

CSO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: How Modern Companies Stop Data Breaches

CSO Magazine

In this three-part series, we are detailing how digital transformation necessitates security transformation and how security service edge (SSE) offerings are the ideal solution for modernizing enterprise cybersecurity. Our previous topic revolved around securing hybrid work. To read this article in full, please click here

article thumbnail

Smart factories unprepared for cyberattacks

CSO Magazine

Many, however, are unprepared to deal with the growing number of cyberthreats against them, according to a report released last week by Capgemini , a provider of technology and digital transformation consulting services.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

BrandPost: Edge Computing: The Security Imperative

CSO Magazine

Edge computing is gaining traction quickly – with some analysts deeming it the next great revolution in technology. Some of the industry’s biggest players are making significant investments in edge computing to help their customers implement digital transformation initiatives. billion by 2024.

article thumbnail

BrandPost: Safeguarding your Connectivity Supply Chain

CSO Magazine

Connectivity supply chain is the term NETSCOUT uses for this attack surface because it is made up of all the technologies and services that enable companies and individuals to stay connected to the internet.