AI has enhanced security in critical infrastructure, but integrating AI with legacy systems in OT environments presents challenges, said Sithembile Songo, group head of information security at Eskom, a utilities company in South Africa. Network segmentation is a must, he said.
Why are we talking about metadata? Why now?
Because metadata has fairly obvious limitations that are being overlooked.
The problem isn't that we create or use metadata — it is the way it is used that causes trouble.
This white paper dives into:
The good, bad, and the ugly of metadata
Why metadata isn't...
Four years ago, federal regulators started sending a message to healthcare entities about the need to give patients timely access to their health records. Insurer UnitedHealthcare, the 45th firm penalized for potential "right to access" violations, agreed to an $80,000 fine and corrective action.
Third-party risk is a key threat in the entertainment industry, where sensitive content and key assets are scattered among multiple entities across the supply chain. Shemaroo Entertainment's Dilip Joshi discusses risks, implementation challenges, budgeting and regulatory compliance in this sector.
Spoiler alert: In 2022, audits found open source in 100% of our customer engagements.
Since open source usages are now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Consequently, open source security and license compliance...
Ninety-four percent of recent survey respondents are concerned that TLS 1.3 will break their existing security controls. With the ever-expanding amount of encrypted network traffic mandated, it’s important to understand how to balance user and customer privacy with security controls. Join experts from Cisco Security...
Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer. Code42's Joe Payne shares the challenges of detecting source code theft and ways to protect intellectual property wherever it resides.
The Indian government has scuttled its personal data protection bill after the proposal grew in scope beyond data protection "and was creating degrees of complexity." Arrka Consulting CEO Shivangi Nadkarni shares her views on what the new bill must incorporate.
Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
The BeyondTrust Microsoft Vulnerabilities Report, produced annually, analyzes the
data from security bulletins issued by Microsoft throughout the previous year. Every
Tuesday, Microsoft releases fixes for all vulnerabilities affecting Microsoft products,
and this report compiles these releases into a year-long...
In this whitepaper report, you will be able to learn how there are solutions that enable people to be more productive than ever, while securing
and managing all endpoints. Together with a strong AI and predictive security portfolio, the suites enable Zero Trust to meet security team needs, while delivering the...
Third-party risk management (TPRM) is more important now than ever. The practice extends far beyond "checking the box" for compliance. And while compliance is a critical component, recent market turbulence has organizations prioritizing business continuity, financial due diligence, and business resilience. How can you...
Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity.
Cybercriminals are "upping their game" by stealing and then auctioning off on the dark web administrative access credentials to healthcare organizations' clinician and patient portals, says Etay Maor of IntSights.
The Government of India is discussing a plan to change its data localization stance, allowing companies to store only critical data locally. Some observers support the idea, while others ask the government not to "give in to pressure" from Western lobbyists.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.