article thumbnail

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

The Last Watchdog

Here are the key takeaways: Micro-managing workloads Companies today are immersed in digital transformation; they’re migrating to cloud-based business systems, going all in on mobile services and embracing Internet of Things systems whole hog. It gives system administrators a way to secure each microsegment, separately.

Marketing 194
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later. The intensely competitive cybersecurity talent market is partly to blame here.

Security 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. This daily horse-trading of marketing, financial, legal and operational data requires granting access to a diverse array of third parties.

Access 194
article thumbnail

How to Meet Phishing-Resistant MFA

Thales Cloud Protection & Licensing

CISA strongly urges system administrators and other high-value targeted users (attorneys, HR Staff, Top Management.) Highly targeted resources such as email systems, file servers, remote access systems must be protected with phishing -resistant authentication in priority.

Phishing 118
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Digital transformation has only exacerbated this security skills gap. Rising implementations of cloud services and IoT systems, not to mention the arrival of 5G, has quickened the pace of software development and multiplied data handling complexities. Take PowerShell-enabled breaches, for instance.

Security 159
article thumbnail

Why Data Democratization? Why Now? What Does It Look Like?

erwin

When you’re looking for a definition of data democratization, you find a few common threads: making digital information accessible to the average user. opening up information systems to business users without requiring the involvement of IT personnel. Kind of a “Power to the People” meets “digital transformation” theme.

IT 52