Security leaders discuss advanced persistent threat challenges facing enterprises, providing insights on how to identify and stop targeted attacks. They suggest appropriate mitigation techniques for advanced threat protection.
Some 85 percent of the mobile banking apps in the Asia-Pacific region fail basic security checks, according to a recent study by AppKnox. Experts outline the challenges faced by banks in securing mobile apps and share some recommendations.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
After blaming a recent spate of bank robberies on banks' poor information security practices, SWIFT has changed its tune. Now it says it wants to help financial firms spot related fraud and better share information about unfolding threats.
Anonymous is threatening global banks with 30 days of distributed denial-of-service attack disruptions and temporarily disrupted the Bank of Greece website as a preview. Security experts say all banks should take the DDoS threat seriously.
Amidst emerging technologies, CISOs must prepare to deal with a new set of challenges. And security should become a board agenda, says Vijay Subramanyam, partner with KPMG's IT Risk Consulting Practice.
A jury's decision to award $940 million in damages to electronic health records software vendor Epic Systems, which had sued India's Tata Consultancy Services alleging theft of trade secrets, serves up lessons about the importance of restricting access to all sensitive data, including intellectual property.
Banking institutions and associations are demanding that the Federal Financial Institutions Examination Council make significant changes to its Cybersecurity Assessment Tool. What action, if any, will regulators take in response?
The primary mission of the new Global Cyber Alliance is to identify measurable ways to mitigate cyberthreats facing the public and private sectors, says Phil Reitlinger, a former DHS official and Sony CISO, who heads the new group.
Reports on the Ukrainian energy supplier hack have left many crucial questions unanswered: Who was involved, did malware directly trigger a blackout and are other suppliers at risk from similar attacks? Cybersecurity experts offer potential answers.
The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.
Vivian Poon, head of Network Security Operations at UBS, sees the need to encourage women to take up new roles in risk management, governance, security and forensics. How does she recommend recruiting these new professionals?
TalkTalk's confusion in the wake of its recent data breach, as well as mangling of technical details and failure to encrypt customer data, demonstrate the importance of having an incident-response plan ready in advance of any breach, experts say.
Gain insights from nearly 1000 IT Security professionals in more than 50 countries on today's vulnerability management programs. Get "in the trenches" information on challenges, satisfaction, and areas in need of improvement.
Download this report to learn about these key findings and the importance of:
Discussions I recently moderated around mobile security indicate that Indian practitioners have significant doubts about the effectiveness and applicability of mobile security solutions such as MDM and others.