Remove Digital transformation Remove Internet Remove Technology
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

LW: In what noteworthy ways have legacy technologies evolved? Ollmann: Cybersecurity technologies are continuously evolving; they must because both the threat and the business requirements are continuously changing. That said, to date the two biggest changes and influences upon legacy technologies have been public cloud and AI.

article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. Now consider that cloud computing is still on the rise, and that the Internet of Things is on the verge of rapid expansion as more 5G networks come on line. I agree with Hudson. I’ll keep watch.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

If you haven’t heard, we are undergoing “digital transformation.” Digital advances are coming at us fast and furious. Misuse and manipulation of machine identities almost certainly is coming into play in the type of deep breaches digitally-transformed organizations are now experiencing.

article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Related: Cyber spies feast on government shut down.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. We need to pick-up some by-products from our cutting-edge technologies, and it should be aligned with our future technologies.”.

article thumbnail

Digital Transformation Frameworks for Cyber Risk Teams

Security Boulevard

Businesses are embracing digital transformation to drive agility and ensure their success in a digital-first economy. This includes adapting to digital technologies like the cloud and the Internet of Things (IoT) as part of their transformation strategies.

article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

In fact, API stands for Application Programming Interface, the indispensable technology that makes it possible for software applications to exchange data across the Internet. APIs have been a cornerstone of our digital economy from the start. Related: Cross-site scripting threat heats up.