Despite a slew of measures announced by the Modi government last year to encourage cybersecurity startups in the region, security experts argue that converting these plans to actionable policies and creating demand has proven difficult.
Concern about privacy spurs consumers to work more closely with their banks, says Robert Zerby, vice president and financial crimes manager within the Community Banking Risk Management division at Wells Fargo Financial Crimes Risk Management.
An investigation into last year's attempted theft of $170 million at India's state-owned Union Bank has found strong similarities with the Bangladesh Central Bank heist, which was attributed to North Korea, and resulted in an $81 million loss.
Park a police car beside a road, and traffic slows down. David Pollino of Bank of the West takes a similar approach to mitigating the insider threat at the institution. What is the bank's 'noisy' program, and how does it discourage rogue behavior? Pollino explains.
A report outlining new ways to recruit and retain cybersecurity professionals in the U.S. federal government leads the latest edition of the ISMG Security Report. Also, the sector considered the most cybersecurity challenged, and the growing interest in virtual private networks.
Legislation to direct the National Institute of Standards and Technology to create a set of tools, best practices and guidance to help small businesses protect their digital assets is heading to the U.S. Senate.
As the threat landscape evolves, with risks exposed by newer technologies and commoditization of attack infrastructure, the motives of targeted attackers may also be evolving as they try new ways to influence change in an increasingly digital world.
With ransomware attackers having already launched attack code with themes ranging from horror movies and Pokemon to Hitler to cats, it was only a matter of time before they decided to beam Star Trek's Kirk and Spock direct to would-be victims' PCs.
With apologies to Troy Hunt, the last thing you want to see in the morning as you're having your first cup of coffee and scanning the interwebz for cat videos is a notice from his "Have I Been Pwned" breach-alert service.
In the wake of a recent breach of the Singapore Ministry of Defense's I-net system, the ministry has unveiled a cyber defense strategy to help guard against similar attacks. Some 2,600 cyber defenders will be trained.
Hackers have been targeting the likes of AOL and Yahoo, in part, because a certain generation of users - including many senior U.S. officials - continue to use the services to send and store state secrets. Let's make sure future generations don't make similar mistakes.
U.S. prosecutors are expected to soon issue indictments charging four individuals with launching hack attacks against Yahoo, Bloomberg reports. But it's unclear to which of the two massive Yahoo breaches the charges might relate.
FireEye's Mandiant investigative unit is seeing a revival in tried-and-true hacking techniques, ranging from social engineering to the snatching of OAuth tokens. Why are these old techniques still working?