In a keynote address at the RSA Conference 2019, RSA President Rohit Ghai encouraged attendees to work in the coming years to "implement a security program with machines and humans working together. Humans asking questions; machines hunting answers."
Multi-stage attacks use diverse and distributed methods to circumvent existing defenses and evade detection - spanning endpoints, networks, email and other vectors in an attempt to land and expand. Meanwhile, individual tools including DLP, EDR, CASBs, email security and advanced threat protection are only designed to...
Indian hackers recently defaced more than 200 Pakistani websites, apparently in retaliation for a suicide bomber, allegedly from Pakistan, killing 40 Indian soldiers on Feb. 14. Now the Indian hacking community must work with the government to prepare for a possible retaliatory cyberattack from Pakistan.
In 2017, 15,038 new CVEs were published, up from 9,837 in 2016. Last year, 16,500 new CVEs were disclosed. With vulnerabilities growing year after year, patching every potential threat to your business is a futile exercise. The need to prioritize is clear, but where to start, especially when CVSS categorizes the...
As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.
For security professionals seeking reliable ways to combat persistent threats to their networks, there's encouraging news. Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this ebook, Oracle's Laurent...
Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for the business.
...
Security practitioners should strive to offer their organizations "frictionless" security that's truly a business enabler, says Sridhar Govardhan, newly appointed CISO of Wipro Ltd., a Bengaluru-based company offering information technology, consulting and business process services.
Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.
Today's sophisticated attacks routinely evade conventional after-the- fact technologies such as firewalls and signature-based malware detection.
Download this white paper and learn how:
To stop command-and- control infiltration before it can do real harm;
A predictive IT strategy can help you prevent attacks...
For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods...
Around the world, many CIOs at various levels of governments expect an increase in cybersecurity spending in 2019, according to new research from Gartner. Alia Mendonsa, co-author of the report, analyzes the results of a global survey.
Enterprise use of artificial intelligence, including machine learning, is
taking off. Early adopters report widespread substantial benefits and
a few challenges.
Download this infographic to learn more about the top and bottom-line benefits from AI and ML.
Although machine learning and artificial intelligence help in an incident response plan, companies must avoid excessive dependence on them, says Venkata Satish Guttula, director of security at Rediff.com.
Aite Group's Shirley Inscoe predicts that more banks will implement robotic process automation in 2019 to make fraud investigations more efficient. She explains how the technology can help.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.