article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

Today, Ollmann is the CTO of IOActive , a Seattle-based cybersecurity firm specializing in full-stack vulnerability assessments, penetration testing and security consulting. The post NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out first appeared on The Last Watchdog.

article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. It's a stark reminder that digital transformation needs to work alongside equally robust cybersecurity measures.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. However, the full fruition of DevSecOps is something that is going to have to happen if digital transformation is to achieve its full potential. You can’t do that anymore.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Here we’ll discuss penetration testing types, methods, and determining which tests to run.

article thumbnail

Automated Penetration Testing vs. Manual Penetration Testing

Appknox

The 'new normal' has expanded the market for digital transformation initiatives and cloud migration strategies. Many businesses are running remotely as a result of the latest COVID-19 pandemic.

article thumbnail

Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’

The Last Watchdog

Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Pen testing has limitations, of course. These shortcomings have been exacerbated by digital transformation, which has vastly expanded the network attack surface. Bad news is always anticipated.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs.

Mobile 266