article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. The COVID-19 pandemic further accelerated the transformation from many years to just a couple of years. This 3-part series will discuss digital transformation (DT) from several perspectives. The Genesis of Digital Transformation.

article thumbnail

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

eSecurity Planet

That means hackers will increasingly mimic nation-state threat groups by establishing a long-term presence inside networks to mine highly sensitive data. Additionally, attacks are poised to become even more damaging as companies expand their digital footprint and the attack surface grows. But how effective is zero trust?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

This digital transformation is creating new risks, because each environment, and each vendor within these environments, requires a unique approach to protecting data. Look at how frequently we hear about AWS S3 buckets left out in the clear with sensitive information for hackers to mine.

article thumbnail

GUEST ESSAY: What your company should know about addressing Kubernetes security

The Last Watchdog

Kubernetes is one of many key enabling technologies of digital transformation that has tended to remain obscure to non-technical company decision makers. The recent Tesla crypto-mining attack used an unprotected Kubernetes console to gain access to the underlying servers. Related podcast: Securing software containers.

Security 147
article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

However, keeping these old systems running can use up resources that would be better deployed driving digital transformation. Legacy applications running on older operating systems are often incompatible with modern security and authentication methods, and therefore more vulnerable to security breaches.

ECM 167
article thumbnail

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

The Last Watchdog

APIs are the conduits for moving data to-and-fro in our digitally transformed world. DevOps has decentralized the creation and delivery of smart applications that can mine humongous data sets to create cool new user experiences. The forward-pull of digital transformation is kicking in.