Remove Digital transformation Remove Software Remove Technology
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. A machine, in this context, refers to any piece of hardware or software that can accept and execute instructions. By comparison, scant effort has gone into securing the latter.

article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

LW: In what noteworthy ways have legacy technologies evolved? Ollmann: Cybersecurity technologies are continuously evolving; they must because both the threat and the business requirements are continuously changing. That said, to date the two biggest changes and influences upon legacy technologies have been public cloud and AI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

The Last Watchdog

If you haven’t heard, we are undergoing “digital transformation.” Digital advances are coming at us fast and furious. Misuse and manipulation of machine identities almost certainly is coming into play in the type of deep breaches digitally-transformed organizations are now experiencing.

article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Related: Cyber spies feast on government shut down.

article thumbnail

Asset management in the age of digital transformation

CyberSecurity Insiders

Over the past year or so, organizations have rapidly accelerated their digital transformation by employing technologies like cloud and containers to support the shift to IoT and address the expanding remote workforce. The post Asset management in the age of digital transformation appeared first on Cybersecurity Insiders.

article thumbnail

How to make sure your digital transformation is secure

CyberSecurity Insiders

In our increasingly digital world, a greater proportion of businesses across different sectors are trying to integrate new technologies into their processes. Technologies such as IoT, cloud computing, edge computing, and AI have the ability to drastically improve the service and operations of any business. Untapped potential.

article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. Cornell is the chief technology officer at the application security firm Denim Group. But for all the upside, there is a downside to the digital transformation.