As cyber threats rise, industry experts see an opportunity to involve government and private entities in building the capacity of security professionals through effective partnerships and cybersecurity clusters.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
Discount brokerage firm Scottrade says hackers accessed its computer network and stole names and street addresses of millions of its clients. The firm says it learned of the intrusion from law enforcement officials.
Gartner research director Craig Lawson discusses three waves of threat intelligence services that can be leveraged by enterprises in building a threat detection model, while emphasizing what is driving the third wave.
Even if China fails to live up to its promise to stop pilfering corporate trade secrets, as America's spy chief predicts, the U.S. could still benefit diplomatically from the two nations' cybersecurity agreement.
Three years after a wave of DDoS attacks hit banks, two years after the Target breach and one year after the massive JPMorgan Chase breach, Standard & Poor's for the first time has warned that it may downgrade the credit ratings of banks that have poor cybersecurity.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
Cybercrimnals are now using the Dyre and Dridex banking Trojans to gather massive amounts of data about individuals and companies that could enable them to track patterns of behavior, which might later help them evade intrusion detection, says Fox-IT's Eward Driehuis.
PCI Council General Manager Stephen Orfei says the migration to EMV in the United States will facilitate faster adoption of contactless mobile payments. That's why mobile will be a hot topic at the PCI Council's annual North America Community Meeting this week.
To build a resilient and secure enterprise, security leaders must take a risk-based approach and build the capabilities to understand the risk appetite of the organisation, says Gartner's Tom Scholtz.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
The U.S. and China, as part of a cybersecurity agreement, have agreed not to conduct or knowingly support cyber-enabled theft of intellectual property with the intent of providing competitive advantages to companies or commercial sectors.
The cyber expert panel formed by the ministry of Home Affairs late last year came up with its plan to tackle cybercrime in India. Security experts recommend that the ministry focus on state-level skill development.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.