article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. All of the technical innovation cybersecurity vendors are churning out to deal with ever-expanding cyber risks, at the end of the day, come down to protecting encrypted data. Refer: The vital role of basic research.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. The intensely competitive cybersecurity talent market is partly to blame here.

Security 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Leading-edge cybersecurity systems in service today apply machine learning in some amazing ways to help large enterprises identify and instantly respond to cyber threats.

Security 201
article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

What’s happening is that digital transformation, while providing many benefits, has also dramatically expanded the attack surface. “An Security information and event management systems — SIEMs — came along in about 2005 to screen all incoming data packets and kick out alerts to anything that seemed suspicious.

Security 127
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem.

Risk 147
article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Related: Free ‘VRMM’ tool measures third-party exposure Just take a look at Europe’s GDPR , NYDFS’s cybersecurity requirement s or even California’s newly minted Consumer Privacy Act. And Jordan has had a hands-on role working third-party risk issues for more than a decade.

Risk 164
article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

The global cybersecurity community is keenly aware of these developments and earnest discussions are underway about how to deal with the attendant security exposures. Initially introduced in 2005, CVSS is a framework for rating the severity of security vulnerabilities in software. Barda: Yes. The risks are growing for two reasons.

IoT 174