What can CISOs at banks do to help prevent fraud as the region, and in particular India, moves toward achieving a cashless economy? Theo Nassiokas, director, APAC cybersecurity, at Barclays Bank, offers insights in an in-depth interview.
Phishing attacks are on the rise, due in large part to how easy to launch and lucrative they are for the attackers, says Brooke Satti Charles of IBM Trusteer.
"Phishing is a really easy way to perpetrate an attack," says Satti Charles, a financial crime prevention strategist. "Creating a sophisticated way to break...
Because the Aadhaar identification system is now being used for purposes for which it was not designed, such as transaction authentication, the risks involved are growing, says cyberlaw expert Na. Vijayashankar.
Members of Parliament in Britain have had their remote email access suspended following an apparent brute-force hack attempt aimed at exploiting weak passwords to gain access to their accounts. Officials say fewer than 90 email accounts appear to have been breached.
It's easy to draw a direct link between high-profile breaches and the compromise of user credentials. But it requires a phased approach to actually improve privileged access management, says Barak Feldman of CyberArk.
Synthetic ID fraud is a fast-growing, multibillion dollar issue. Often misclassified as a credit loss, synthetic ID fraud is now affecting an expanding list of entities. Also, unless extremely large, this "victimless" crime often does not get the full attention of law enforcement. From the LexisNexis data labs, learn...
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
Security practitioners in India need to have a better perception of threats and risks to build successful detection and defense strategies. That was one of the key lessons offered at ISMG's Fraud & Breach Prevention Summit in Bengaluru June 7.
A discussion analyzing the difficulty of striking a balance between IT functionality and cybersecurity leads the latest edition of the ISMG Security Report. Also featured: Updates on sizing up weaknesses in biometrics and the potential to exploit LED lights to leak sensitive data from routers.
Retailers and financial institutions are dealing with the changing face of customer interactions. For many businesses, mobile logins have surpassed online logins, and consumers are voicing their demands for more mobile services. Consumers expect to bank, pay, buy, transfer and more via their mobile devices - and they...
Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses as well as big data and machine learning combining to secure IT.
Target has reached a record settlement agreement with 47 states' attorneys general over its 2013 data breach. The breach resulted in hackers compromising 41 million customers' payment card details and contact details for more than 60 million customers being exposed.
DSCI is working with the FIDO Alliance in an effort to eliminate the use of passwords for authentication in India. But some security practitioners question whether that's a realistic approach that will prove effective. go