article thumbnail

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

While Shadow IT has been largely quelled, the core dynamic that started all this fuss – eager humans scrambling to use the latest, greatest cloud-enabled services – remains a major security issue, one that now connects directly to digital transformation. A synopsis of key takeaways: Misconfigurations.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

Extending ‘digital trust’ As DigiCert and Oracle separately headed down these paths, digital transformation shifted into high gear and massive interconnectivity built off of wide distribution of ephemeral APIs took center stage. And that was the design point we gave them.”

Cloud 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

To make an impact, they must be able to address the audience in accessible business language and in risk language. CISOs’ fundamental challenge Continual clear communication is needed to cut through the noise and confusion of digital transformation. If you look at the military model, the military is constantly training.

Security 309
article thumbnail

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

The Last Watchdog

Without them digital transformation would never have gotten off the ground. based application security vendor, today is launching a new solution, called API Sentinel, designed to help companies jump in and start proactively mitigating API risks, without necessarily having to slow down their innovation steam engine.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Software is now central to the operation of our economy – as digital transformation washes over every industry. And yet, the awareness of cyber security risks – from phishing and social engineering attacks to software supply chain compromises – remains low. Nobody knows that better than our guest this week.

article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

His approach uses the philosophy that is used in the military, whereby an untrained individual is placed into positions based on aptitude. There are roles around risk management, disaster recovery, certification, and audit that are not technology focused. These have to be better publicized to bring more interest into the field.

article thumbnail

Three ways for agencies to prepare for the Internet of Things

CGI

IoT is already a part of digital transformation for federal agencies and other large organizations seeking to improve citizen and customer experiences. One example: By using sensor technology with cloud computing, IoT transforms existing, disparate IT systems into a connected enterprise of applications. The future is things.

IoT 40