Remove cyber-risk managed-everything-vendors-shifting-to-services
article thumbnail

MY TAKE: How ‘CAASM’ can help security teams embrace complexity – instead of trying to tame it

The Last Watchdog

The shift to software-defined everything and reliance on IT infrastructure scattered across the Internet has boosted corporate productivity rather spectacularly. Gartner refers to this nascent technology and emerging discipline as “cyber asset attack surface management,” or CAASM.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

Log4j is the latest, greatest vulnerability to demonstrate just how tenuous the security of modern networks has become. Related: The exposures created by API profileration. Log4j, aka Log4Shell, blasted a surgical light on the multiplying tiers of attack vectors arising from enterprises’ deepening reliance on open-source software.

Security 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

APIs are putting business networks at an acute, unprecedented level of risk – a dynamic that has yet to be fully acknowledged by businesses. That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022.

Security 242
article thumbnail

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

The Last Watchdog

Related: Implications of huge Capital One breach CASBs supplied a comprehensive set of tools to monitor and manage the multitude of fresh cyber risks spinning out of the rise in in corporate reliance on cloud services. Shifting responsibilities Ask Capital One how difficult that is.

Cloud 149
article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

President Biden came into office around the time of the SolarWinds and Colonial Pipeline cyber attacks, so cybersecurity has been a major focus of the Administration from the beginning. ” Those fundamental shifts are focused on two core priorities. ” Those fundamental shifts are focused on two core priorities. .”

article thumbnail

Cyber Security Awareness Month: Time to Act and Protect Trust

Thales Cloud Protection & Licensing

Cyber Security Awareness Month: Time to Act and Protect Trust. We’re approaching the end of Cyber Security Awareness Month , an annual event dedicated to increasing awareness of cybersecurity topics globally. The proliferation of digital has seen us move from bricks and mortar stores and banks to online services. Time to act.

article thumbnail

Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Thales Cloud Protection & Licensing

Given this, healthcare organizations need to advance their security efforts to adapt to this shifting environment. Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment. Tue, 11/17/2020 - 06:44. Healthcare providers are at the epicenter of the fight against coronavirus. ransomware). ransomware).