Remove Digital transformation Remove Presentation Remove Risk
article thumbnail

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Last Watchdog

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. The cloud presents a dual risk. Related: CASBs needed now, more than ever. Deepening services. It creates many more possible ways to get at a company’s systems and data.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. Each key, in turn, can be configured to enable access to a dataset only under certain conditions, i.e. if certain attributes are present.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises

CyberSecurity Insiders

To download the full study, see the Zscaler 2021 VPN Risk Report. However, the increased demand for remote work solutions, a shift to the cloud, and advancements in digital transformation have uncovered increased incompatibility between VPNs and true zero-trust security architectures. About Zscaler. Media Contacts.

VPN 125
article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? That out of the way, business can proceed with less risk.

Risk 164
article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. So be careful out there. I’ll keep watch and keep reporting. Acohido Pulitzer Prize-winning business journalist Byron V.

Mobile 200
article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Third-Party Risk Management ( TPRM ) has been around since the mid-1990s – and has become something of an auditing nightmare. Related: A call to share risk assessments. This is because third-party risk has become a huge problem for enterprises in the digital age. Cyber risks profiling. Cyber hygiene boost.

article thumbnail

Safeguarding the company’s risk profile after a hasty digital transformation

SC Magazine

Now that we are a full year into the new world order and the pandemic has eased up a bit, companies are taking a deep breath and starting to consider how the past 14 months fundamentally reshaped their digital transformation plans. Ben Smith, field chief technology officer, RSA.