article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Related: Cyber spies feast on government shut down. Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding.

article thumbnail

Digital transformation: are you flying, or falling with style?

CGI

Digital transformation: are you flying, or falling with style? It’s the same when you’re a CEO grappling with digital transformation. Landing your digital strategy is something you either commit to fully or not at all. He had a small army of staff, and funding from the US government. 6 miles, 6,000 feet.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

Just as it has in other sectors, technology and digital transformation has remade the agriculture sector over the century. corn seed companies grew from 59 percent in 1975 to 85 percent in 2015. Spotlight Podcast: Managing the Digital Risk in your Digital Transformation. Today, there are just 40,000.

article thumbnail

‘Digital by Default’ and ‘Collaboration’: my two key takeaways from Civil Service Live 2015

CGI

Digital by Default’ and ‘Collaboration’: my two key takeaways from Civil Service Live 2015. Fri, 10/16/2015 - 00:40. Last week I had the pleasure of attending Civil Service Live in London, an excellent event which provided a real insight into the way in which Government is embracing change through digital.

article thumbnail

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

The Last Watchdog

I was in the audience at Stanford in 2015 when President Obama signed an executive order urging the corporate sector to accelerate the sharing of threat feeds among themselves and with the federal government. Here are the key takeaways: Deeper sharing Wider threat intelligence sharing continues to advance apace. I’ll keep watch.

article thumbnail

The Rise of the Bad Bots

Thales Cloud Protection & Licensing

However, by 2015, bad bot traffic had fallen to its lowest historical level of 18.6%, mainly due to increased human traffic from China, India, and Indonesia. However, while gaming suffers most from bad bots, the law and government sectors suffer from the most advanced ones. of internet traffic, while good bots accounted for 19.4%

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. To get an idea of how serious this problem might be, a 2015 report by the University of Cambridge Centre for Risk Studies estimated a major grid attack in the U.S.