ISMG's Fraud and Breach Prevention Summit in Bengaluru on June 12 and 13 will offer insights from leading CISOs and other experts on hot topics, including artificial intelligence, endpoint detection and response, blockchain and GDPR compliance.
Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.
Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault and recommends all users change their passwords immediately.
In the new borderless, cloud-first paradigm that organizations find themselves in, a robust identity mechanism provides the best context for securing access, says Dustin Maxey of Ping Identity.
Over 55 percent of people will reuse passwords despite acknowledging the risks, says Amber Steel of LastPass. In the enterprise context, this bad behavior needs to be addressed without burdening employees with policies which could impact productivity, she says.
How do we establish and maintain digital trust without burdening our users? What are the critical questions that need to be addressed by anyone managing identity and access management in a modern enterprise? David Duncan of CA Technologies offers answers to these questions.
What are the best practices for addressing security in "smart city" projects? Vikas Kanungo, senior consultant, transport and ICT global practice, at the World Bank, offers insights in an in-depth interview.
Identity is changing with the fusion of public and private trust models. Entrust Datacard's Ray Wizbowski discusses the shifting landscape and how best to secure it.
The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.
The Unique Identification Authority of India has taken the next step toward adding an extra layer of security to protect Aadhaar data, a move that some security leaders are welcoming in light of recent Aadhaar-related data leaks.
A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit. But Google, which owns YouTube, says that tampering didn't occur directly on its platform.
Overlooked areas of security and defense include four pitfalls of privileged access management, says Sam Elliott of Bomgar, who offers insights on taking the right steps.
The technology and operating models for identity and access management have evolved with time, but the way many enterprises approach IAM has not. How can security leaders modernize their IAM strategy in this era of unprecedented complexity? Patrick Wardrop of IBM Security shares insights.
If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.