ISMG's Fraud and Breach Prevention Summit in Bengaluru on June 12 and 13 will offer insights from leading CISOs and other experts on hot topics, including artificial intelligence, endpoint detection and response, blockchain and GDPR compliance.
Since its inception the NIST Cybersecurity Framework has been embraced across geographies and sectors. Trend Micro's Ed Cabrera talks about how to maximize the framework as a baseline for improving cybersecurity posture.
Many merchants in Japan find it difficult to pass a PCI Data Security Standard audit because the PCI guidelines are changed too frequently, argues Yiochi Ueno, who serves as a Qualified Security Assessor who audits merchants.
Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.
The annual Infosecurity Europe conference returns to London this week, with a focus on the latest cybersecurity trends and essential practices for organizations. Hot topics range from artificial intelligence and breach response to GDPR and battling cybercriminals and nation-states.
A lawsuit seeking class action status has been filed in the aftermath of a data breach impacting 150 million users of Under Armour's MyFitnessPal mobile application and website. But the apparel maker has asked the court to compel arbitration of the case.
Apps for smartphones pose many privacy risks. But Venugopal C of Check Point says the European Union's General Data Protection Regulation, which is now being enforced, potentially could have an impact on the kind of information apps gather.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
With the European Union's General Data Protection Regulation now in full effect, cybersecurity startups in India are facing their own set of challenges. While many have complied with the regulations as much as possible, some have put on hold plans to expand into the European market.
The European Union's new data protection enforcement is prompting a rethink about data handling in Australia, which has had a casual approach to privacy, says Brian Fletcher, Symantec's director of government affairs in Asia Pacific.
What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.
The EU's General Data Protection Regulation has gone into full effect as of May 25, 2018. After a two-year grace period following the passage of the legislation, member states' data privacy watchdogs are now enforcing the strong privacy rules, which offer worldwide protection for Europeans.
To judge by the flood of GDPR-themed email hitting inboxes, Europe's privacy law has been designed to ensure that you say "yes" to companies that monetize the buying and selling of your personal details, regardless of whether you remember ever having done business with them before.
Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.
As Japan continues it push toward digital transactions, it's taking steps to ensure security, including adopting the PCI Data Security Standard, says Jeremy King, international director of the PCI Security Standards Council, who offers an update.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.