Nation-state attacks. SOC automation. Zero trust. Protection of critical infrastructure. These were some of the key themes that discussed at Information Security Media Group's recent Cybersecurity Summit in Delhi.
Since the $81 million Bangladesh Bank online heist in 2016, the nation's banks have made some progress in cybersecurity, but they still have a long way to go, says Prabeer Sarkar, CEO of Dhaka Distributions, a local cybersecurity company, who sizes up what work still needs to be done.
Mitsubishi Electric says hackers exploited a zero-day vulnerability in its anti-virus software, prior to the vendor patching the flaw, and potentially stole trade secrets and employee data. The Japanese multinational firm announced the breach more than six months after detecting it in June 2019.
ISMG and Cybereason visited Dallas on their "Indicators of Behavior" roundtable dinner tour. And Cybereason CSO Sam Curry says the discussion validated the notion that it's time to reimagine incident detection and response.
Building a public/private partnership for cybersecurity is time consuming and resource-intensive, but such a model can play a key role in protecting critical infrastructure, says Ravikishor Mundada, CEO of the Center of Cybersecurity Excellence, Government of Karnataka.
If you analyze any of the recently published cyber attacks, two patterns emerge:
80-90% of the attacks exploit an unpatched vulnerability or an unhardened, widely open system
70% of the attacks begin at the endpoints
While "cool" new products create a lot of buzz, cyber hygiene is often ignored. But, it must be...
Visibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by knowing which systems, applications and data they have, says AlgoSec's Jeffrey Starr. He discusses how centralized visibility, control and automation can help.
It's critical for SOC team to extensively leverage Artificial Intelligence to transform its operations and enhance its investigation capabilities in making the organization safe from attackers and achieving the business goals.
Despite multiple government agencies being formed to fight cybercrime, efforts need to be made for better coordination between them, said Lt Gen (retd) Rajesh Pant, the newly appointed national cybersecurity coordinator, PM Office, Government of India.
Keeping organizations safe from attackers and staying one step ahead of them is a tough proposition, and hence identifying threats accurately with integrated user behavioral analytics and artificial intelligence makes tremendous sense as this can save invaluable investigation time.
The rapid pace of technological advancement has brought with it the emergence of a number of pain points
as each new technology poses a host of new security challenges. Digital transformation creates challenges
for any organization, but for smaller enterprises with a more compact staff, these changes risk...
It is not uncommon to hear about the perpetual shortage of skilled personnel in the cybersecurity industry. The 2017 Frost & Sullivan/(ISC) 2 Global Information Workforce Study concluded that by 2022, the industry would face a 1.8 million worker shortfall.1
Download this ebook to learn more about:
The government of India has created a Defense Cyber Agency that's designed to help in the battle against hackers and has appointed a chief. But does the creation of this agency represent a meaningful strategic initiative or a narrower tactical effort?
There's good reason that's an increasingly common battle cry among cyber security professionals: Fresh digital security threats continually emerge from new and unexpected sources. Just consider the sudden spread of viruses like WannaCry and Petya/NotPetya, the expansion of ransomware threats, the growth in coinmining...
Attackers are in a constant race to update and refine their approach to stay a step ahead of cybersecurity
professionals. Recently, cybercriminals have adjusted the delivery mechanism of their "payload" away from
traditional attack methods. Most often, security breaches are associated with a malicious executable...