Remove Digital transformation Remove Information Security Remove Risk
article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Along the way, of course, cybersecurity must get addressed.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce. No matter which opinion you agree with, digital transformation and new technologies will impact the workforce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In

The Hacker News

In an era where digital transformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate strategy and risk management.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. Observes Salvi: “We’ve gone to a stage where the Chief Information Security Officer has become a well-defined, mainstream role. Related: Why U.S. None of this is easy.”

CISO 309
article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Risks to Your Network from Insecure Code Signing Processes. However, this practice puts these critical resources at risk for being misused or compromised. In addition, code signing often plays second-fiddle to other information security issues and isn’t viewed as a high priority. brooke.crothers. Thu, 07/07/2022 - 15:26.

Risk 98
article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

Based in New York City, Sonrai launched in late 2017 to help companies gain clarity about data and identity security-related relationships within their public cloud envrionments, including Amazon Web Services, Microsoft Azure, Google Cloud. What this allows decision makers to do is visualize risk,” Kedrosky says.

Risk 214