article thumbnail

Web application exposures continue do bedevil companies as digital transformation accelerates

The Last Watchdog

Companies are scaling up their use of web apps as they strive to integrate digital technology into every aspect of daily business operation. As this ‘digital transformation’ of commerce accelerates, the attack surface available to threat actors likewise is expanding. Related: Cyber spies feast on government shut down.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

To get greener, electric utilities must digitally transform. However, even as digitization is phased in, more carbon-killing innovation can occur via force-multiplying tech such as Cloud, AI, and IoT. Intelligent capture with Robotic Process Automation (RPA) digitally transforms documents at the start of the document lifecycle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. Log4j, for instance, is a ubiquitous logging library. The Sunnyvale, Calif.-based

Security 223
article thumbnail

News alert: Zluri raises $20M funding round for SaaS management as identity features take off

The Last Watchdog

Alongside this, the unstoppable wave of enterprise digital transformation, led by generative AI, swift cloud adoption, and the rise of distributed remote workforces, is ushering in a new era of complexity in SaaS operations. About Zluri.

Marketing 188
article thumbnail

Black Hat insights: How to shift security-by-design to the right, instead of left, with SBOM, deep audits

The Last Watchdog

Related: Experts react to Biden cybersecurity executive order. President Biden’s cybersecurity executive order, issued in May, includes a detailed SBOM requirement for all software delivered to the federal government. Meanwhile, the software libraries that group together coding components are growing and subdividing exponentially.

Security 203
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it’s clear to me that there are two primary reasons. One is the intensely competitive nature of organizations, and the other has to do with the escalating digitalization of commerce.

Big data 153
article thumbnail

Legacy application modernization: A comprehensive approach to modernize your business 

IBM Big Data Hub

Security vulnerabilities: Due to outdated security measures and lack of updates, legacy applications are more susceptible to cybersecurity threats. Legacy application modernization is often approached as part of a broader digital transformation initiative.