Leading the latest edition of the ISMG Security Report: Cambridge Analytica shuts down, saying it's lost all of its customers, and Australia's Commonwealth Bank spots a big, bad potential data breach.
Australia's Commonwealth Bank has confirmed that two magnetic tapes containing transaction information for 19.8 million accounts went missing two years ago after mishandling by a subcontractor. A forensic investigation concluded the tapes were likely destroyed, and no fraudulent activity has been detected.
Despite the buzz about digital transformation, most enterprises remain overwhelmed by having to support and secure legacy technologies, says Mark Loveless of Duo Security. How can they simultaneously protect their legacy systems while securing their future?
What matters most, right now, to the information security community? At RSA 2018, RSA's president said WannaCry was a wakeup call for vulnerability and risk management. Other experts see artificial intelligence, machine learning and secure coding as hot trends.
Cambridge Analytica, the data analysis firm that reportedly received data on up to 87 million Facebook users without their consent, shut down on Wednesday. The company had worked on the 2016 campaign of U.S. President Donald Trump. But its backers have launched a new firm, called Emerdata.
Mark Jaffe is less concerned about how adversaries breach networks, but more concerned about how to secure their actual target - critical data. His startup company, Allure Security, intends to help secure that data.
Jason Remillard is president of Data 443, a startup that aims to take data classification and governance out of IT's hands and give that control to the business and the end user. How does it work?
The managed security services marketplace has matured, says Rick Miller of Trustwave. But persistent myths continue to color perceptions. Miller attempts to shatter those myths and shed light on the market's new realities.
The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.
Jan Koum, WhatsApp's co-founder, is leaving Facebook. His departure marks another exit of a high-level privacy and security advocate. If Facebook continues to lose those who could better influence the social networking site's worrying views toward user data, what does that mean for the rest of us?
Business email compromise and account takeover attacks haven't faded; they've just morphed. Wes Dobry of Agari discusses the new wave of these attacks and how organizations can do a better job of detecting and responding to them.
You know that you've got a problem to solve but how will you address it? More importantly, who will help you address it? This is the crux of the build versus buy debate that companies are currently having with themselves.
While building and buying both have their merits, they also have costs which should be...
Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.
As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.