Organizations in the APAC region are not immune to the impact of the SolarWinds supply chain hack, so it's essential that they reassess their risk management practices and audit their suppliers, two security experts stress.
The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
Global messaging app WhatsApp's instant payment service went live in India on Dec.16. But despite its two-factor authentication being accepted by leading banks, there are concerns about potential security issues.
Enterprises should have an incident response plan with a continuous monitoring threat intelligence sharing mechanism to help protect critical infrastructure from nation-state attacks, says Jayesh Ranjan, principal secretary-IT, government of Telangana
An enterprise's cross-functional groups responsible for the business growth and brand reputation should be held equally accountable for cybersecurity. That's the view of a CISO and a CTO who participated in a fireside chat at ISMG's recent Virtual Cybersecurity Summit.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of Things (IoT), bring-your-own-device (BYOD) and cloud initiatives have given hackers new ways to infiltrate your organization by exponentially expanding the attack surface. Technologies like artificial...
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
The year 2021 will see an increase in third-party risks, the evolution of MSSPs, and maturity in identity governance as enterprises in the Middle East region take a fast track approach to the 'cloud-first' strategy, according to a panel of experts.
Traditional anti-money laundering (AML) and combating the financing of terrorism (CFT) tools and tactics take longer and cost more than they should. To fortify the defense, financial institutions need ways to:
Automate tasks that formerly required human intervention, such as disposition of alerts
Detect more risk...
There's a lot of talk about advancing the anti-money laundering arsenal to the next level, sometimes referred to as next-generation AML, AML 2.0 or AML 3.0. Whatever you call the next wave of AML technology, it's about solutions that draw on such advances as robotics, semantic analysis and artificial intelligence...
The future of work remains unpredictable, and organizations must rethink their approach to security to achieve much-needed adaptability and resilience. In this session, learn how the Darktrace Immune System addresses the challenges our next normal will bring with AI augmentation, Autonomous Response, and unified...