article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Related: Cyber spies feast on government shut down.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

Cybersecurity is no different. As both the public and private sector embrace digital transformation and face an increasingly sophisticated threat scape, presidential executive orders have sought to remedy that problem. In the next 2 years, almost half (43%) of IoT devices will use digital certificates for authentication.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

Just as it has in other sectors, technology and digital transformation has remade the agriculture sector over the century. corn seed companies grew from 59 percent in 1975 to 85 percent in 2015. Spotlight Podcast: Managing the Digital Risk in your Digital Transformation. Today, there are just 40,000.

article thumbnail

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

The Last Watchdog

Therefore cybersecurity innovations must take hold both deeper inside and at the leading edges of modern business networks. I was in the audience at Stanford in 2015 when President Obama signed an executive order urging the corporate sector to accelerate the sharing of threat feeds among themselves and with the federal government.

article thumbnail

ENISA Threat Landscape Report 2020

Security Affairs

The 8th annual ENISA Threat Landscape (ETL) report was compiled by the European Union Agency for Cybersecurity (ENISA), with the support of the European Commission, EU Member States and the CTI Stakeholders Group. Still many cybersecurity incidents go unnoticed or take a long time to be detected. Pierluigi Paganini.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. To get an idea of how serious this problem might be, a 2015 report by the University of Cambridge Centre for Risk Studies estimated a major grid attack in the U.S.

article thumbnail

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

And given a tangible network perimeter, cybersecurity evolved following the moat-and-wall principle. SASE (pronounced sassy) replaces the site-centric, point-solution approach to security with a user-centric model that holds the potential to profoundly reinforce digital transformation. Connectivity was relatively uncomplicated.

Access 213