Remove Digital transformation Remove Network Security Remove Technology
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

The tectonic shift of network security is gaining momentum, yet this transformation continues to lag far behind the accelerating pace of change in the operating environment. LW: In what noteworthy ways have legacy technologies evolved? They’re equally in trouble if they don’t adapt and evolve.

article thumbnail

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

The Last Watchdog

Remediating security gaps in modern networks, not surprisingly, can quickly devolve into a tangled mess. Both the technology and the teams responsible for specific cyber assets tend to operate in silos. On the flip side, security gaps are multiplying as network attack surfaces expand exponentially.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Resolutions for 2025

IT Security Guru

With the continued evolution of these risks, IT leaders must adapt by implementing a multi-layered approach to security, staying one step ahead of attackers. Key elements in protecting against AI-driven threats include timely software updates, network security improvements and strong password policies.

article thumbnail

Cisco Secure Workload and Secure Firewall: Strong Alone, Stronger Together

Tech Republic Security

The digital transformation era is changing how organizations leverage technology to fulfill their business objectives. One key change is in the approach to security. Traditional security architecture focused on a hardened perimeter with a vulnerable interior.

Firewall 121
article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Vulnerability management, or VM, has long been an essential, if decidedly mundane, component of network security. Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. Related: Log4J’s long-run risks.

Risk 235
article thumbnail

Endpoint Security: Helping to realize the benefits of SASE

CyberSecurity Insiders

Endpoint security is at the forefront of digital transformation due to the very nature of needing to protect devices outside the company’s network perimeter. Endpoint security then quickly expanded to include mobile security, for smartphones and tablets.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. Smart money.