Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
The cybersecurity sector has made strides in growing its workforce and improving diversity. But significant hurdles remain, and Clar Rosso, CEO of (ISC)², says the keys to clearing them include training and refining current hiring practices.
Tool sprawl is a symptom, and complexity is cybersecurity’s chronic illness. Ashok Sankar of ReliaQuest shares ways to manage this complexity and help organizations rethink how they deploy and measure their cybersecurity defenses.
The cybersecurity adversaries embrace the concept of "shift left," so shouldn't the defenders? Shivajee Samdarshi of Venafi discusses the implications and mindset change for software development and engineering teams.
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
The DarkSide ransomware gang apparently collected over $90 million in ransom payments from about 47 victims, including Colonial Pipeline Co., since the gang began operating in August 2020, according to the blockchain analytics firm Elliptic, which says it analyzed bitcoin wallet activity.
Like many organizations amid digital transformation, Live Oak Bank was growing its cloud footprint and had specific needs for a cloud security provider. Avi Shua, CEO of Orca Security, joins Live Oak Bank CISO Thomas Hill to discuss friction, security and visibility.
A recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. This led to development of the new MITRE ATT&CK Defender training and certification. Rick Gordon of MITRE Engenuity explains.
When it comes to faster payments, the only way to control fraud is to build in fraud and risk mitigation plans before a transaction is made, says Peter Tapling, board member, U.S. Faster Payments Council.
Security orchestration, automation and response technologies, or SOAR, give organizations the ability to manage an increasing number of alerts. But security experts say there's no worry that SOAR will replace people. In fact, SOAR could help with staff retention.
Manish Dave of LafargeHolcim has been part of the manufacturing industry all his professional life. He heads the IT security and internal controls for the APAC region and aims to have a false positive rate of zero.
A previously uncovered banking Trojan dubbed "Bizarro" is now targeting European banking customers through a spear-phishing campaign that attempts to steal credentials, according to the security firm Kaspersky.
Magecart Group 12, known for skimming payment cards from e-commerce websites, is now using PHP web shells to gain remote administrative access to sites that run an older version of Adobe's Magento software, according to analysis by Malwarebytes.
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.