Don't blame a lack of information security standards, security products or cybersecurity competence for the failure of breach defenses. In many cases, the culprit is design and implementation flaws in IT products, Robert Bigman, former CIO at the CIA, contends.
A Japanese ATM cash-out scheme that stole $19 million from South Africa's Standard Bank in less than three hours illustrates why devising better ways to mitigate the risks posed by such schemes must be a priority for financial institutions in markets - including the U.S. - that still rely on mag stripe debit cards.
How can you cut through the web of insurance fraud and protect your organization? Download this infographic to explore:
The costly rise of fraud;
Why combatting fraud is getting harder;
The four steps to counter fraud management and help you unravel the web of fraud.
After blaming a recent spate of bank robberies on banks' poor information security practices, SWIFT has changed its tune. Now it says it wants to help financial firms spot related fraud and better share information about unfolding threats.
Reserve Bank of India wants to recruit senior vice presidents for four vertical functions in its proposed IT subsidiary. But the search for a CEO to lead the team is still ongoing. What is the reason for the delay? And how can the process be streamlined?
Today's threat actors are more focused, funded and disruptive than ever. But the cybersecurity defense industry is not built to respond appropriately, thought leader Tom Kellermann of Strategic Cyber Ventures says in this video interview. What are security leaders overlooking?
A data breach notification service bought what appear to be 117 million username and poorly hashed passwords obtained via the 2012 breach of LinkedIn. That's a far cry from the 6.5 million stolen passwords that initially came to light.
Cyberattacks are increasing in frequency, complexity, nuance and stealth. But human error, business compulsions and increasingly complex environments make it difficult to maintain adequate defenses, says Juniper Network's CTO for India and SAARC
Tavis Ormandy of Google's Project Zero found he could hack Symantec's security products with a single email. The flaw has been fixed, but the finding is a reminder that flaws in anti-virus software can leave users at serious risk from hackers.
In the face of rapidly emerging new technologies and eco-systems, such as the Internet of Things and Smart Nation, Singapore has issued new cloud outage incident response guidelines. Security leaders react to the core recommendations.
Mozilla wants the U.S. government to provide it with information about a possible unpatched vulnerability in its Firefox browser, which was used by the FBI as part of a large child pornography investigation.
The $940 billion compensation awarded to Epic Systems in its case against Indian IT major TCS is unprecedented - shaking the industry out of its complacency to information security. Cyber law expert "Naavi" takes a close look at the implications for India.
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Anonymous, which launched a DDoS attack on Bank of Greece's website and those of several other banks, plans to attack top banks from Southeast Asia. Can Indian banks deflect such attacks with adequate DDoS defences?