In order to improve identity verification, it is not enough to only verify documents; a multilayered
approach is needed, says Brett Johnson, a former fraudster who is now a cybercrime consultant. He discusses current fraud trends and how fraud is evolving.
During testimony before a U.S. Senate committee hearing Thursday, CISA Director Jen Easterly told lawmakers that a recent joint alert issued by her agency, the FBI and the Coast Guard Cyber Command stemmed from an attempted attack against the Port of Houston in August.
Four editors at Information Security Media Group discuss important cybersecurity issues, including the rise of quadruple extortion attacks employed by ransomware gangs, the FBI reportedly withholding the Kaseya ransomware decryption key for weeks, and raising security posture during a pandemic.
As the risks to IT and OT converge, organizations must use "zero trust" to verify user identities and build effective monitoring capabilities to track the behavior of privileged users, say Kartik Shahani of Tenable and Rohan Vaidya of CyberArk.
The ransomware attack on Tamil Nadu's Public Department puts the spotlight on the preparedness to identify and stave off attacks. Some security experts say outdated servers, lack of advanced security measures and inadequate cyber laws make state government institutions vulnerable.
Researchers have identified a new malware sample that is targeting Indian defense personnel. Cyber threat intelligence firm Cyble says the target and attack method of the malware point to the work of APT group SideCopy.
Dwell time, double extortion, supply chain attacks - ransomware has changed considerably over the course of the year, and CyberArk's Andy Thompson says there is much we can learn from the attacks - both the unsuccessful and successful ones - and how they take root.
An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point. Ram also shares his insights on data breach trends.
Republican lawmakers have expressed additional concerns around Chinese telecom giant Huawei to the nation's top diplomat. In a letter to Secretary of State Antony Blinken, Sen. Tom Cotton and Rep. Mike Gallagher outline Huawei's global cloud services and seek answers on privacy concerns.
Avinash Dharmadhikari, the CISO of Persistent Systems, a technology services company headquartered in India, has no complaints about managing different functions under security. He discusses building a security culture in his organization.
As the Senate Homeland Security Committee considers new cyber rules and regulations for U.S. critical infrastructure, lawmakers heard testimony from CISA's Jen Easterly and National Cyber Director Chris Inglis on Thursday in support of these measures, which include updates to FISMA.
The U.S. Federal Reserve said Wednesday it is continuing to evaluate the creation of a central bank digital currency, or CBDC, and that it intends to publish research on the subject shortly, according to Chair Jerome Powell.
The pace of Conti ransomware attacks has been increasing, with more than 400 organizations globally having fallen victim, warns a joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency, FBI and National Security Agency, which details essential defenses.
CyberEdBoard Executive Member Charmaine Valmonte speaks at the ISMG Virtual Cybersecurity Summit Asia: Financial Services. Topics include our new realities and emerging technologies, why we need a cybersecurity maturity model, and the importance of identity management and governance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.