article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

This is the dark side of digital transformation. Traditionally, business applications tapped into databases kept on servers in a temperature-controlled clean room — at company headquarters. Bad actors are constantly evolving their techniques to compromise the organization’s business services,” Srinivasan says.

article thumbnail

Open APIs: A coming of age

CGI

This can be done by building end-to-end security into applications, adopting a federated identity model, and connecting business services with the payment function, thereby bypassing manual interventions, log-ins, passwords, etc.