article thumbnail

What companies need to know about ‘SecOps’ — the path to making ‘digital transformation’ secure

The Last Watchdog

It should come as no surprise that security is being formally added to DevOps, resulting in an emphasis on a process being referred to as SecOps or DevSecOps. With the digital transformation really just beginning, in cloud computing and IoT, it makes sense to bring security into the DevOps conversation. Oil and water.

article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. I had a lively discussion recently with a couple of experts from WhiteHat Security. I spoke with WhiteHat Security researchers Bryan Becker and Mark Rogan at RSA 2019. Baking-in security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting. SMBs today face a daunting balancing act.

Security 163
article thumbnail

Episode 180: Gary McGraw on Machine Learning Security Risks

The Security Ledger

In this episode of the podcast (#180), Gary McGraw of the Berryville Institute of Machine Learning joins us to talk about the top security threats facing machine learning systems. The post Episode 180: Gary McGraw on Machine Learning Security Risks appeared first on The Security Ledger.

Risk 52
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series discusses digital transformation (DT) from several perspectives. 2020, p 1).

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. What’s more, they’ve all successfully grown into multi-layered full-service endpoint security suppliers. keep intensifying.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 100