article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3

article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud. The Netwrix team found that these challenges are exacerbated by business demands for speedy digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity.

article thumbnail

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

The Last Watchdog

Here are the key takeaways: Micro-managing workloads Companies today are immersed in digital transformation; they’re migrating to cloud-based business systems, going all in on mobile services and embracing Internet of Things systems whole hog. It gives system administrators a way to secure each microsegment, separately.

Firewall 149
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. Log4j, for instance, is a ubiquitous logging library.

Firewall 223
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

It was designed to make it convenient for system administrators to automate tasks and manage configurations across all Windows endpoints and servers in a company network. A privileged account provides access to sensitive systems and data bases and typically gets assigned to a system administrator or senior manager.

Hacking 212
article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Cyber defense should be part of every power grid’s digital transformation strategy–not only to ensure the power generation and reliability of the grid, but also to protect sensitive or private data. Best Practices to Secure Critical Infrastructure. All these measures are considered best practices for data protection.