Building business resilience through a "zero trust" approach requires role-based authentication, user access velocity checks, and monitoring people, processes, and technologies, a panel of experts says.
How can insurers take advantage of face authentication to verify customer identity online and prevent fraud?
We've all heard gruesome stories of people hiding a corpse so they can continue to claim a friend or relative's pension. Unfortunately, deepfakes and other technology make it much easier for fraudsters to...
An unidentified hacking group is deploying a rootkit dubbed Netfilter, which is signed in as a legitimate Microsoft driver but used to affect gaming outcomes, researchers at German security firm G Data CyberDefense say.
Aligning a vulnerability management program with a "zero trust" approach helps strengthen cybersecurity, says Kartik Shahani, country manager-India, Tenable.
As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.
In this whitepaper, we cover Okta ThreatInsight, a baseline security feature of the Okta Identity Cloud which helps organizations secure their organization...
As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic server environment requires smart access controls; but how do you adhere to your security policies without limiting automation?
Read the five key takeaways from a webinar featuring Dr. Chase...
Being the CISO of a pharma sector means you are accountable for the decisions made, ensure that you make the best use of the funds, resources and skills, and are capable of translating business requirements into cyber solutions, says Agnidipta Sarkar, group CISO at Biocon, as he takes up the new role.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
Banks in Bangladesh must ensure having a proper data repository and understanding the data flow to establish privacy in a data-driven economy, says Sakil Mahmud, AVP, information security, risk, and compliance at Trust Bank.
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. Whether you’re handling transactional or personal data, it’s critical that it is gathered ethically, managed with integrity, and properly safeguarded. When people are the perimeter, identity becomes the foundation of a Zero...
Organizations in all sectors need to build a continuous monitoring and response mechanism to defend against ransomware attacks, according to a panel of security experts from the Middle East
Building an effective cyber resilience strategy requires implementing the right controls and using a collaborative approach, a panel of experts from the Middle East said at the RSA Conference 2021.
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
As a retired Air Force general and the former federal CISO of the United States, Gregory Touhill is well-versed in critical infrastructure protection and resiliency. Now, as the new director of CMU SEI's CERT division, he has the opportunity to help foster new levels of education and collaboration.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.