article thumbnail

A Data Security Nightmare Before Christmas

Thales Cloud Protection & Licensing

A Data Security Nightmare Before Christmas. During the heady days of rapid digital transformation and exponential data growth, they developed technology and capabilities that allowed any data dependent organization to embed data security into the very fabric of their business systems. Data security.

article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

The zero trust approach to enterprise security is well on its way to mainstream adoption. Lots of innovation has come down the pike with respect to imbuing zero trust into two pillars of security operations: connectivity and authentication. This is the dark side of digital transformation. This is a very good thing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

Amazon had introduced Amazon Web Services in 2006 and Microsoft Azure became commercially available in 2010. Cavanagh As a latecomer to the hyperscale data center market , Oracle focused on its heritage of helping large enterprise customers securely and efficiently run their mission critical systems and applications, Cavanagh told me. “We

Cloud 195
article thumbnail

For nearly two decades, IBM Consulting has helped power SingHealth’s digital transformation

IBM Big Data Hub

The healthcare industry’s heavy reliance on legacy systems, regulatory and security challenges are significant hurdles for its journey toward digital transformation. We saw this during the COVID-19 pandemic as many large healthcare systems scrambled to integrate digital technology at speed.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Allegedly developed by US and Israeli operatives, Stuxnet was discovered circulating through Iranian nuclear energy facilities in 2010.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series discusses digital transformation (DT) from several perspectives. 2020, p 1). “As

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 120