Karl Sebastian Greenwood, a dual citizen of Sweden and the United Kingdom, pleaded guilty in U.S. federal court to his role in selling the purported multibillion-dollar cryptocurrency pyramid OneCoin that netted $4 billion. He now faces sentencing.
IronNet is just days away from insolvency and its board of directors says it will investigate allegations that company executives misled investors over growth projections. The firm was founded and is helmed by retired Army Gen. Keith Alexander, the former NSA director and U.S. Cyber Command chief.
APIs increasingly drive everything from web and mobile application development to IoT devices since they streamline communication among disparate systems, says Synack CEO Jay Kaplan. But testing the efficacy and security of APIs remains challenging given the size of API endpoints.
After 20 years DDoS remains a problem due to the old protocols used by the internet, making DDOS protection and mitigation not just sensible to have but a fundamental element of cybersecurity.
Anything that can write a software code can also write malware. The latest AI technology can do it in seconds. Even worse, it could open the door to rapid innovation for hackers with little or no technical skills or help them overcome language barriers to writing the perfect phishing email.
As the world looks into adapting 5G and studying 6G, satellite IoT is opening a new front for connectivity. There will be a demand for more LEO-based satellites for low-power communication, and these satellites will require completely new kinds of security, says Krishnamurthy Rajesh of GreyOrange.
Staying one step ahead of both threat actors and competitors is a tall task for Palo Alto Networks given the breadth of its cybersecurity portfolio. Palo Alto Networks has committed to having best of breed features and functionality in each of the technology categories where it chooses to play.
Experiencing an attack is only a matter of time. Most organizations are unaware when a breach is made, and threats go undetected for months at a time due to a global lack of visibility, especially when it concerns endpoints. But there are X5 firewall practices to prevent a data breach.
Apple is advancing plans to allow Europeans to access third-party app stores via their iPhone and iPad, as will soon be required under European law. What this means in practice for its vaunted walled garden security model, and whether most users will bother, remains unclear.
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
The $250 million acquisition of Cider Security will allow Palo Alto Networks to secure a piece of code from development to its implementation in a runtime environment. CEO Nikesh Arora says the company must understand the tool sets and open-source widgets coming into the customer's supply chain.
The security industry has traditionally tried to protect sensitive data by putting control points on endpoints or networks, but Skyhigh Security has taken a different approach. The company applies consistent policies around how data is treated across its ZTNA, SWG and CASB offerings.
Ngrok has closed a $50 million Series A round to provide enterprise-grade authentication and user and session observability without adding complexity for developers or users. Ngrok will use the proceeds to support additional authentication protocols and build out integrations and connections.
The founder of bankrupt cryptocurrency exchange FTX, Sam Bankman-Fried, has been arrested by police in the Bahamas, the day before he was due to remotely testify before Congress. Bahamian officials say he faces a "likely" extradition request from the U.S., which has filed charges against him.
Banks using behavioral-based controls are detecting malicious accounts in 92% of cases before traditional AML and transaction monitoring systems alert the bank.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.