Behavioral biometrics can play an important role in thwarting ever more sophisticated payment fraud schemes, says Robert Capps of Mastercard, who provides a fraud-fighting update.
Software development benefits from security checks being brought to bear early and often, but the blending of in-house and open source code has historically complicated that process, says Patrick Carey of Synopsys. Now, however, maturing toolsets and approaches are facilitating security checks, he says.
In response to White House warnings that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage, Andy Purdy of Huawei Technologies USA says his company has pledged full transparency and urges competitors to follow suit.
As the RSA 2020 conference showcased "The Human Element," Palo Alto Networks' M.K. Palmore turned his attention to the passive insider threat - the one that intends no malicious harm, but whose actions can lead to costly breaches.
Today's security practitioners need to fuse cybersecurity with compliance and privacy. Stacy Scott and Alan Brill of Kroll discuss a defensible security strategy.
Retired General Keith Alexander knows a thing or two about building defenses. As the president of IronNet Cybersecurity, the ex-NSA director is now calling for private sector and government entities to come together in an effort he describes as "collective defense."
Malware defenses today too often function as black boxes, producing binary results that make it difficult for security teams to prioritize, when what's needed is transparency, to enable defenders to better understand threats and prioritize their response, says Mario Vuksan, CEO of ReversingLabs.
As RSA 2020 neared its close, RSA President Rohit Ghai visited ISMG Studios to discuss the event's theme, "The Human Element," as well as digital risk management and the pending sale of RSA.
The U.S. is late to the 5G race. But there are multiple strategies that policymakers can pursue to facilitate the near-term rollout of safer and more trusted 5G networks across the country, says Michael Chertoff, executive chairman of The Chertoff Group and Department of Homeland Security secretary.
In 2019, the Global Cyber Alliance debuted its toolkit to help small and midsized organizations bolster cybersecurity. How has the toolkit been received and refined? Phil Reitinger, who heads the alliance, discusses progress.
CISO stress levels are higher this year than last. What is the impact on these individuals and their enterprises? And what should be done to alleviate this stress? Stuart Reed of Nominet analyzes the latest CISO Stress report.
In an RSA 2020 conference keynote, Cisco's Wendy Nather spoke of "democratizing security" - thinking differently about the people we serve and secure. She expands on that theme and discusses her role as head of advisory CISOs at Cisco's Duo Security unit.
What are enterprises seeking in their next CISO - a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities she's looking for when recruiting CISOs.
WatchGuard Technologies has released its latest Internet Security Report. CEO Prakash Panjwani draws on that research to discuss attack trends, cloud security and how to mitigate the global skills shortage.
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.