"Shadow IT" has long existed slightly under the radar of the enterprise IT and security organizations. The term describes business units that opt to embrace IT systems and applications, including SaaS apps, without the express consent and support of IT.
In the past, these transgressions have mainly been overlooked....
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Financial services firms and healthcare institutions have been at the forefront of adopting encrypted email, simply because so much vital and sensitive information today naturally flows via email, Dave Wagner, CEO of ZixCorp, says in this video interview.
The Government of India will partner with the Maharashtra Police to train cybersecurity professionals to tackle cybercrime. NIELIT will take up the task of imparting cybersecurity and forensic training to nearly 60,000 personnel.
Multiple hospitals from Hollywood to Germany have been hit recently by ransomware attacks. It's a reminder that no organization is immune to outbreaks of malware that's designed to forcibly encrypt all data stored on PCs and servers.
Warning: Too many voice over IP devices being used in enterprise environments have well-known default passwords or no security at all, thus leaving organizations at risk from covert surveillance and toll-fraud scammers, experts say.
New electronic payment methods lead to huge security challenges. Experts suggest initiatives including deploying standard security controls at all levels, mandatory breach disclosure, and sharing best practices to secure gateways.
The story around payment security in India is driven by the spurt of technology innovations in nontraditional payment channels that are seeing massive traction. SISA's 2016 Summit will look at innovation and the threat landscape.
CERT-In has inked a new cybersecurity agreement with Malaysia, Singapore and Japan to promote information sharing and threat detection. What challenges will these nations face, given their diverse cultures and priorities?
How many networking vendors - like Juniper - have been selling devices with backdoors attackers could use to intercept and decrypt communications? Some networking giants say they've launched code reviews. But why are eight vendors staying silent?
Singapore plans to introduce a cybersecurity bill to protect its critical infrastructure from cyber threats and make investments in skills-building. Information security experts weigh in with their candid reactions to this emerging legislation.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
As nations worldwide struggle with effective cyber legislation, Europe leads. Dr. Henning Wegener, chairman at World Federation Of Scientists' Permanent Monitoring Panel on InfoSec, speaks to what makes this possible.
Adobe is warning Flash users to update their software immediately in the wake of zero-day attacks that can enable attackers to take full control of vulnerable systems. This year, Adobe has patched 316 bugs in Flash. Is it time for the plug-in to die?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.