article thumbnail

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

When I first wrote about Cloud Access Security Brokers in 2015, so-called CASBs were attracting venture capital by the truckloads — and winning stunning customer testimonials. That suggests CASBs may yet have an enduring role to play in securing what our business networks are morphing into, as the result of digital transformation.

article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

In March, for example, CISA the US Cybersecurity and Infrastructure Security Agency warned the heads of critical infrastructure organizations about the ongoing activities of “Volt Typhoon” and advanced persistent threat (APT) group linked to China’s military. Warnings about state sponsored actors sniffing around U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

The Security Ledger

Its first applications were securing email and physical access systems in security conscious environments like the military, intelligence community and government. Just point your web browser to securityledger.com/subscribe to get notified whenever a new podcast is posted. Survey: 50,000 Certs on Average.

IoT 98
article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Cyber criminals have discovered Zoom logons, in particular, to be useful for carrying out credential stuffing campaigns to probe for deeper access inside of breached networks. To make an impact, they must be able to address the audience in accessible business language and in risk language.

Security 309
article thumbnail

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The Last Watchdog

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Silverfort has introduced new technology that is designed to help corporations address unprecedented authentication exposures spinning out of ‘digital transformation.’.

article thumbnail

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

The Last Watchdog

Without them digital transformation would never have gotten off the ground. Thousands of live APIs, accessible over the Internet, stand at the ready so that you and I can use our go-to smartphone apps. Application Programming Interfaces – APIs. APIs have exploded in enterprise use over the past several years.

article thumbnail

State of Preservica - Highlights and Momentum Looking Ahead

Preservica

The acceleration in digital transformation and cloud-first initiatives over the last year has put increased focus on the way long-term digital content is governed and used. Military Women’s Memorial - The nonprofit organization is the only historical repository documenting a century of stories from all military women's service.