Remove Digital transformation Remove Firmware Remove Technology
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. It’s typical for an enterprise to rely on tens of thousands of digital certificates, with the number growing daily, thanks to digital transformation.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Today we’re in the throes of digital transformation. I had the chance to talk about DigiCert’s perspective with Jason Sabin, DigiCert’s Chief Technology Officer. We discussed why elevating digital trust has become so vital. Advanced data security technologies, no matter how terrific, are just one piece of the puzzle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Protection on Demand: The Key to Cloud-Based Key Management

Thales Cloud Protection & Licensing

This body used the work of the National Institute of Standards and Technology (NIST) and others to release version 2.0 Organizations are undergrowing a digital transformation in which they’re adding new data and assets to their networks. Take the Payment Card Industry Security Standards Council (PCI SSC), for instance.

article thumbnail

The Future of Payments? Frictionless.

Thales Cloud Protection & Licensing

When companies attempt digital transformations, the rush to implement new technology sometimes overshadows full consideration of risk. For example, in our annual Data Threat Report we found that 97% of respondents are storing sensitive data in digitally transformative environments, but only 30% are deploying encryption.

article thumbnail

EU and US agencies warn that Russia could attack satellite communications networks

Security Affairs

The risk of cyber attacks is growing with services in any industry increasing reliance on satellite-dependent technologies. A third type, non-kinetic anti-satellite weapons , use technology like lasers to disrupt satellites without physically colliding with them.” " — Chris Bing (@Bing_Chris) March 15, 2022. .”

article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

It was done, for instance, while upgrading a device, to check to make sure the firmware didn’t have any bugs and that all the necessary signatures were in place, where needed. Now we’re using the same CyberFlood technology and making it available to run in the live network.

article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

IIoT transforms traditional, linear manufacturing supply chains into dynamic, interconnected systems that can more readily incorporate ecosystem partners. Overlooking IoT security challenges may interrupt company operations and negate the positive digital transformation effects. Related posts.