article thumbnail

Companies need CASBs now more than ever — to help secure ‘digital transformation’

The Last Watchdog

Ever see the video of dolphins gorging on a bait ball? While Shadow IT has been largely quelled, the core dynamic that started all this fuss – eager humans scrambling to use the latest, greatest cloud-enabled services – remains a major security issue, one that now connects directly to digital transformation. CASBs new role.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Software is now central to the operation of our economy – as digital transformation washes over every industry. And yet, the awareness of cyber security risks – from phishing and social engineering attacks to software supply chain compromises – remains low.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Thanks to the sudden rise in use of Zoom and other video conferencing systems by an expanding work-from-home workforce, their logons are begin targeted by threat actors; underground forums today are bristling with databases holding hundreds of thousands of recycled Zoom logon credentials.

Security 309
article thumbnail

State of Preservica - Highlights and Momentum Looking Ahead

Preservica

The acceleration in digital transformation and cloud-first initiatives over the last year has put increased focus on the way long-term digital content is governed and used. Military Women’s Memorial - The nonprofit organization is the only historical repository documenting a century of stories from all military women's service.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

He holds a PhD and MS in computer science from Colorado Technical University and a BS from American Military University focused on counter-terrorism operations in cyberspace. LW: How far do you expect the corporate sector to actually get mitigating cyber risks as digital transformation accelerates?

Passwords 149
article thumbnail

Capturing Paper Documents - Best Practices and Common Questions

AIIM

And while there are many technological approaches to digital transformation, the first step is often scanning. Also known as “capture,” this capability is characterized by the ability to scan paper documents to store and use them in digital form instead of paper. National Archives and Records Administration (NARA).

Paper 90