As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
Authentication innovation is still in its infancy, and most companies are still combining more traditional passwords and PINs with cutting edge
biometrics or contextual decisioning methods. The combination brings new capabilities to multi-factor authentication, but doesn't necessarily produce the best possible...
The digital shift is increasing the need for more sophisticated privacy and data protection measures. Several major institutions have seen their information security compromised in recent years as cyberattacks and fraudulent activity show no sign of slowing down. With PSD2 regulations now in effect, companies are in...
Following banks in India and Russia reporting losses due to fraudulent transactions via the SWIFT interbank messaging platform, security experts are advising banks to be more vigilant and to take certain security steps, including better securing of remittance transactions.
WhatsApp, the global messaging app that has more than 200 million monthly active users in India, has leveraged National Payment Corporation of India's Unified Payment Interface platform to launch its beta payment service that will allow users to send money to other WhatsApp users, excluding merchant accounts.
After a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity system that's designed to put users in control of their personal information.
In an exclusive, in-depth analysis, a panel of security experts concludes that India's recent Aadhaar data security conundrum, resulting in identity theft and data breaches, was due to poor implementation of security, monitoring and authentication mechanisms.
Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. While this transition presents cost and time savings, you may soon come across a few limitations and email encryption is one of them. Integrating your Office 365 environment...
Artificial intelligence will play a greater role this year in fooling attackers and authenticating users and sessions, predicts cybersecurity attorney and consultant Chris Pierson, who explains why.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Vishal Salvi of Infosys on the CISO's evolving role. Another influencer, Pavan Duggal, advocate, Supreme Court discusses what steps the Indian government should take to secure privacy....
True "next-generation" multi-factor authentication (MFA) platforms should be well equipped to manage the customer experience while providing the right level of security assurance at the right time, anytime.
Download this e-book and learn ten criteria to look for in a robust MFA platform, including:
Decentralized,...
To address growing concerns about Aadhaar, the Unique Identification Authority of India, which administers the ID program, is taking two key steps to add a layer of security. But some observers are already questioning whether the move will prove effective.
Banks in India are alerting customers to take steps to guard against becoming a victim of Android malware that's targeting 232 applications, including banking and cryptocurrency apps, paving the way for potential thefts from their accounts.
Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR once enforcement of the data protection law begins later this year.
After news of yet another apparent Aadhaar-related data breach, some security experts are once again calling for the government to substantially beef up security for the identification system.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.