A leaked database compiled by a Chinese company has suddenly become the focus of news media reports warning that it could be used as an espionage instrument by Beijing. But on closer examination, the alleged "social media warfare database" looks like public information largely scraped from social media sites.
In the three years since Equifax suffered a massive data breach, the consumer credit reporting firm says it has worked tirelessly to overhaul the security shortcomings that allowed the breach to happen. Equifax CISO Jamil Farshchi and other security experts weigh in on important lessons learned.
When implementing a cybersecurity risk framework, enterprises should use a structured approach to identity and evaluate and manage the risks posed by increased digital transactions during the pandemic, says Dmitry Chernetsky, global presales expert, Kaspersky-APAC.
A proactive approach to your agency's security posture is a highly cost-effective way to reduce your cybersecurity exposure; particularly when you consider security breaches have increased by 11% since 2018 and 67% since 2014. To help you reduce your exposure, the Essential 8 are the fundamental elements from the...
Organizations are creating, sharing and storing data at an unprecedented level, data protection mandates worldwide are becoming increasingly stringent. In this report, learn how you can improve your data security posture and become fit for compliance.
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
A "zero trust" framework can help organizations better define their access control strategies and ramp up authentication, says Vishal Salvi, global CISO and head of cybersecurity at Infosys Ltd., a multinational outsourcing company.
This white paper starts with a look back at the evolution of encryption and key management systems. The challenges for IT teams around
encryption systems are then examined, including regulation and compliance, complexity, lack of proper management tools, and ensuring
availability and scalability. This is followed by...
Australian shipping giant Toll Group recently suffered its second ransomware outbreak of the year, with Thomas Knudsen, the company's managing director, branding the latest attack as being "serious and regrettable." But was it preventable?
If an organization fails to stop a ransomware attack, how does it recover the data? Backups, of course, are essential. But Peter Marelas of Dell Technologies says organizations should have a well-developed strategy for backups because attackers are increasingly targeting those systems as well.
There is a common belief that implementing a Unified Endpoint Management (UEM) solution, or its predecessor, a Mobile Device Management (MDM) solution, with a mobile container provides solid protection for enterprise data. This is a misconception. Companies that build their mobile security strategy by relying solely...
To ensure business continuity, companies that support India's critical infrastructure need to validate the functioning of the security controls and other tools deployed to support the remote workforce during the COVID-19 pandemic, says Mumbai-based Shivkumar Pandey, group CISO at the Bombay Stock Exchange.
Modern remote teams are made up of whatever combination of people can get online and get the work done. That means many different kinds of users are working together in the same tools - full-time employees, contractors, freelancers, vendors and partners. How do you protect your company's data everywhere it's hosted...
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.