Remove Digital transformation Remove Penetration Testing Remove Technology
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

Today, Ollmann is the CTO of IOActive , a Seattle-based cybersecurity firm specializing in full-stack vulnerability assessments, penetration testing and security consulting. LW: In what noteworthy ways have legacy technologies evolved? We recently reconnected. Here’s what we discussed, edited for clarity and length?

article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. Cornell is the chief technology officer at the application security firm Denim Group. But for all the upside, there is a downside to the digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Here we’ll discuss penetration testing types, methods, and determining which tests to run.

article thumbnail

Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’

The Last Watchdog

Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Pen testing has limitations, of course. These shortcomings have been exacerbated by digital transformation, which has vastly expanded the network attack surface. Bad news is always anticipated.

article thumbnail

The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities

Security Boulevard

Years ago, we couldn’t foresee the potential impact of digital technology innovations on brand stability. Network connectivity and digital transformation are a double-edged sword that holds the key to brand promotion and protection while also exposing companies to great.

article thumbnail

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The Last Watchdog

Based in Bengalura, India, Indusface helps its customers defend their applications with a portfolio of services that work in concert with its flagship web application firewall ( WAF ,) a technology that has been around for about 15 years. WAFs have become a table stakes; any company with a public-facing website should by now have a WAF.

Software 189
article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Digital transformation is all about high-velocity innovation and on-the-fly change. Related: Data breaches fuel fledgling cyber insurance market.