article thumbnail

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

When I first wrote about Cloud Access Security Brokers in 2015, so-called CASBs were attracting venture capital by the truckloads — and winning stunning customer testimonials. CASBs (pronounced caz-bees) originally sought to resolve a fast rising security nightmare: Shadow IT.

article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Baking-in security. Key takeaways: Myriad vault doors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. Nonetheless, it is a pivotal chapter in the evolution of digital commerce. Things have since taken a turn for the better.

article thumbnail

NEW TECH: Critical Start applies ‘zero-trust’ security model to managed security services

The Last Watchdog

That’s where managed security services providers, or MSSPs, come in. The global market for managed security services is expected to rise to $48 billion by 2023, up from $24 billion in 2018, according to ReportLinker. He went shopping for a MSSP to come in and help to reinforce certain security functions. Eroding effectiveness.

Security 189
article thumbnail

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Network security is in the throes of a metamorphosis. Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. Related: Automating security-by-design in SecOps. This means Security Operations Centers are in a transition.

Security 127
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

Just as it has in other sectors, technology and digital transformation has remade the agriculture sector over the century. Spotlight Podcast: Synopsys’ Dan Lyon on the Challenge of Securing Connected Medical Devices. corn seed companies grew from 59 percent in 1975 to 85 percent in 2015. And on and on.

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

Healthcare’s IT evolution has brought numerous security challenges including regulations, the use of digitally transformative technologies that have created huge amounts of data to store and protect, and the extraordinary value of electronic personal health information (ePHI) to cybercriminals. Regulations.