Lenovo issues an emergency patch to fix flaws in the System Update software that it preinstalls on business-focused Windows PCs after security researchers discover vulnerabilities that could be used to remotely compromise machines.
The Abu Dhabi government is investing in the healthcare industry and encouraging cloud and virtualization technologies for better productivity. George Yacoub of SEHA sees immense security challenges ahead.
What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
As computing becomes borderless, adversaries are increasingly bypassing perimeter security and taking advantage of vulnerabilities brought on by the growing number of applications and their unsecured entry points. At the same time, business managers are dramatically increasing the rate of deployment of often rushed to...
With a spate of recent breaches taking place at well-known companies including Target, Home Depot and Sony, organizations must reevaluate the security of the code running within the enterprise. Leaving flawed code in place almost invites hackers in to the company's network. While most companies try to secure the...
Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras, and recorders all connected via the cloud to a mobile device or the web. But are they and IoT applications in general secure from hackers? This research study...
There is no question that mobile computing is growing at an exponential rate. It's been a remarkable and rapid transformation that much like the advent of the web has left security concerns outpaced by the ease of use and flexibility of a new tool. When vulnerabilities are exploited, the security of mission-critical...
Open source software is a game-changer in helping development organizations herd their application security risks. But it can also introduce risk when employed without adequate precautions. Recent evidence suggests that the presence of application vulnerabilities in open source software is a far more pervasive...
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers...
Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. These vulnerabilities are the gateway that malicious actors use to circumvent security protections and steal or alter data, deny access, and compromise critical business processes. The processes that...
With the upcoming release of Windows 10, Microsoft plans to inaugurate 24/7, cloud-based patching, among other new security features. Businesses can tap the anytime patches or define their own patch-release schedules.
The demand for improved governance and risk management is huge in Dubai and neighbouring regions, as global players embark on ambitious projects. Smartworld's Ahmad Qurram Baig discusses the CISO's responsibilities.
Oman is dealing with the challenge of increasing cyber incidents and a rise in cybercrime and so on. How does Oman's CERT address this surge? OCERT's head, Al Salehi, shares his 2015 cybersecurity agenda.
One year after Sally Beauty Supply revealed that a network breach compromised payment card data and exposed 25,000 records, the company says it is investigating new breach reports. Did it fail to eradicate the original intrusion?
In this exclusive interview, Kelly King, CEO of BB&T, one of the nation's largest banks, urges other CEOs to ensure that their executive teams and boards are well-informed about cyber-risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.