A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy standards more stringently.
A new research project called Amnesia tackles the password management problem by not storing full data in any one place where it can be hacked. But does this proposed solution truly offer better password security?
London's Metropolitan Police Service is under fire for continuing to use 27,000 PCs that run the outdated Windows XP operating system, as well as paying for a pricey extended-service contract.
Implementing a successful cybersecurity strategy in light of advanced threats calls for operationalizing three key principles: visibility, identity and risk, says Zulfikar Ramzan, chief technology officer at RSA.
The Turkish government, following the failed military coup against it, has blocked access to the whistleblowing website WikiLeaks after it published nearly 300,000 emails tied to the country's ruling party. WikiLeaks says it accelerated the information release to protest "post-coup purges."
The 2016 RSA Conference Asia Pacific & Japan, to be held July 20-22 in Singapore, will offer a security road map, imparting lessons to practitioners to help them navigate through cybersecurity complexities. Here's a preview of some of the top session.
As CSO and CTO of Arbor Networks, Sam Curry is in a rare position: He can set security strategy and then go out and find the tools to execute it. Where does the human factor enter the equation, and how must we re-think our traditional strategies?
Parag Deodhar, the new CISO for Asia Pacific and Japan at Paris-based AXA Group, discusses key strategies for "wartime" CISOs in this in-depth interview.
Deception technology is gaining prominence with top organizations around the world. As more practitioners join the active defense bandwagon, is your organization ready? Smokescreen Technologies' Sahir Hidayatullah shares some insights to get you going.
Deception technology could be a game-changer, with many thought leaders and organizations already getting behind the concept of "assume compromise." Smokescreen founder Sahir Hidayatullah speaks about the rise of this emerging technology.
As many as 250,000 credentials for Remote Desktop Protocol servers around the world may have been offered for sale on the now-shuttered xDedic cybercrime marketplace. So what can organizations do to mitigate related risks and avoid a major network intrusion?
Despite police disrupting alleged DDoS extortion gangs such as DD4BC, inexpensive stresser/booter services have enabled copycats to continue these attacks, says Akamai's Martin McKeay. Here's how organizations can defend themselves.
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.
The nature of sophisticated fraud is changing, argues NPCI's Bharat Panchal. He shares experiences from his sector to support this idea, and he shares insights on how this will affect the security practitioner roles.
For years, organizations have been threatened by DDoS attacks on several fronts, ranging from volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks. Trey Guinn of CloudFlare discusses how to respond to each type of attack.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.