The recently released National Security Policy emphasizes building cybersecurity resilience in the Philippines. To do this, businesses must focus on protecting identity, push for cybersecurity education and protect critical infrastructure from external cyberattacks, said CISO Charmaine Valmonte.
XDR can help security organizations achieve better outcomes by ensuring simplification, consolidation, integration and automation in their cybersecurity environment. XDR integrates siloed security layers and helps to bridge the visibility gap, said CrowdStrike's Nitin Varma.
Seoul police have accused the North Korean hacker group Andariel of stealing sensitive defense secrets from South Korean defense companies and laundering ransomware proceeds back to North Korea. The hackers stole 1.2TB of data, including information on advanced anti-aircraft weapons.
Suspected Chinese threat actors used a Gh0st RAT variant to target South Korean entities and the Uzbekistan Ministry of Foreign Affairs to gather intelligence. According to Talos Intelligence, SugarGh0st features additional capabilities that enable it to defeat signature-based detection tools.
The Indian government has exempted the national Computer Emergency Response Team from providing information to citizens under the Right to Information Act. Industry experts believe the move may dilute the agency’s public accountability and transparency.
In this era of extended digital transformation projects and emerging AI technologies, understanding the implications of technological advancement - and the risks that come with innovation - is increasingly critical for enterprise security, according to Sambasivan G, CFO at Tata Play.
Indonesian data protection experts recommend understanding the types of personal data collected and their purpose, urging companies to leverage established frameworks such as NIST and ISO 27701. These frameworks should align with the regulations of each country.
AI has become a major talking point for cybersecurity vendors since the release of ChatGPT a year ago. But AI and ML are nothing new, and the power behind using them to detect cyberthreats comes from the richness of datasets, said Debasish Mukherjee, VP of sales for the APJ region at SonicWall.
Governments across Asia are raising concerns over growing misuse of artificial intelligence as adoption of AI technology surges. With organizations racing to exploit the latest AI capabilities, government leaders also want them to address AI-enabled cybercrime, AI bias and hallucinations.
The Australian government announced it will invest AU$18 million to help the country's small businesses better respond to cyberattacks and will spend AU$7.2 million to help businesses get cybersecurity assessment checks and AU$11 million to provide one-on-one assistance to deal with cyberattacks.
The endless search for best of breed cybersecurity solutions has left many companies awash in tools, and many are suffering from vendor fatigue. The situation has gotten out of hand, said Debasish Mukherjee, VP of sales for the APJ region at SonicWall, who makes the case for a platform approach.
Financially driven cybercriminals exploit the human factor to commit online scams. Pooja Shimpi, CEO and co-founder of SyberNow, explained why it is necessary for netizens to practice online mindfulness and enhance cyber awareness to avoid becoming victims of innovative scams.
The Australian Cyber Security Center said in a report Wednesday that small and medium-sized businesses in Australia continue to face the bulk of cyberattacks. Cyber operations linked to financially motivated scams have grown by 23% over the past year.
The Indian government directed social media companies to clamp down on deepfakes and misinformation shortly after a deepfake video of a leading actress sparked public criticism. Social media firms must act within 36 hours of a complaint and potentially face prosecution.
Declining consumer spending and a looming cost-of-living crisis in Australia have forced a majority of small businesses to cut cybersecurity spending and devote available funds to revenue generation efforts such as customer acquisition, client relationships and growth.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.