Technologists are wrangling with an identity puzzle: Is it possible to create a single digital identity that can be seamlessly and securely used at a bank, a hospital or consumer websites? It's the holy grail of identity. But experts say blockchain is likely not the answer right now.
When building a next-generation cybersecurity operations center, or CSOC, organizations must first understand their attack profile and determine the scope of threat monitoring needed, says Jagdeep Singh, CISO at Rakuten India, an e-commerce company.
Breaches tied to WannaCry and Petya, which affected about 48,000 computers in India, as well as other major breaches worldwide, are leading more Indian firms to purchase cyber insurance. But come companies still are concerned about the extent of coverage that's available.
Virtual currency that's been surging in value, stored in internet-connected banks and virtual "hot wallets": What could go wrong? The answer includes well over $175 million worth of stolen cryptocurrency and attacks that have been tied to North Korea's Lazarus Group.
As a longtime investor in companies offering cybersecurity solutions, Alberto Yépez of Trident Capital Cybersecurity is most concerned by a lack of investment in one key area; replacing aged technologies that are supporting critical infrastructure industries, such as power utilities.
We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.
The cyber espionage group that executed a campaign against the Democratic Party has been gearing up to attack the U.S. Senate, cybersecurity firm Trend Micro warns. Separately, a Senate report demands that the White House do more to prevent the 2018 and 2020 U.S. elections from being disrupted.
While alternative solutions provide incomplete coverage across computing platforms, MaaS360 delivers cognitive UEM across all endpoint types including smartphones, tablets, laptops, desktops, devices designed for the IoT, ruggedized devices and wearables.
Download this security data sheet to learn about:
Security practitioners in India and Asia, heeding warnings from vendors and government agencies, are grappling with security challenges posed by the two critical vulnerabilities dubbed Meltdown and Spectre that are affecting desktop computers, smartphones, tablets and cloud services.
Patch or perish to protect against Meltdown and Spectre attacks, and prepare to keep patching as Intel, AMD and ARM, as well as makers of devices running Apple, Google and Windows operating systems, including Apple iOS and Android smartphones and tablets, continue to refine their fixes.
Some Indian organizations are not aware that their networks are being used for mining bitcoins, says Rakesh Goyal, managing director at Sysman Computers, a CERT-In empaneled audit firm, who offers insights on improving network security.
CISOs need to precisely tailor their risk management strategies to protect the specific high-value assets of their organization; a broad-brushed approach will never work, says UK-based Kelly Bissell, managing director and global lead, Accenture Security.
Ransomware has ascended, by some estimates, to a $1 billion industry. Although the FBI advises against paying ransoms, some organizations see it as the quickest way to recovery. Michael Viscuso of Carbon Black says that the larger problem is a failure to defend networks.
From worsening ransomware attacks to deepened concerns about external digital risk, former AT&T CISO Ed Amoroso says 2018 will be a challenging year, and security teams need to be building out their resiliency plans to prepare for what's ahead.