The UAE Banks Federation, which has 49 member banks, has launched the Cyber Threat Intelligence Initiative 2017 to create an information sharing platform in an attempt to better detect and respond to cyberattacks. But are these banks ready to share information or report breaches?
Organizations must adopt a multi-layered, defense-in-depth approach to online security to combat today's threat landscape. Rather than relying on just one or two of the so-called 'next-gen' techniques in isolation, a robust, multi-layered approach should involve a vast array of signature- and non-signature based...
Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure.
Download this whitepaper that covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging...
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
Since the major DDoS attacks of 2012, the threat landscape for financial institutions has dramatically evolved. Banks are now facing a whole host of problems including credential abuse, account takeover, and fraudulent money movements.
Download this interview transcript with Rich Bolstridge of Akamai Technologies...
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
With an aim to safeguard capital markets from cyberattacks, the Securities and Exchange Board of India has set up a committee on cybersecurity to provide guidance. But some security practitioners stress that the panel will prove effective only if its recommendations are actually carried out.
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
CISOs are increasingly being asked by management and boards to predict what the cost of a breach or cyber incident might be. But most still need to develop good predictive metrics, says Benjamin Dean, president of Iconoclast Tech.
As the practice of crimeware as a service matures, the defensive game for security leaders completely changes, says Michelle Cobb of Skybox Security. She explains how organizations should respond.
In his world travels, Steve Durbin of the Information Security Forum sees the global cybersecurity industry coming of age. But he also sees the steady maturation of cybercriminals and their schemes. How can organizations best counter the changing threat landscape?
Security practitioners are debating the role deception technologies can play in a security strategy. But how does the latest technology actually work? Sahir Hidayatullah, CEO and co-founder of Smokescreen Technologies, offers some insights.
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
Cyber threats pose a risk to federal agencies accomplishing their designated missions. By following best practices to simplify security intelligence, an agency reduces the burden on its security operations team and allows technology to do the work of surfacing and responding to cybersecurity threats.
Download this...
Here are five cyber-related takeaways from FBI Director James Comey's testimony before the Senate Judiciary Committee, including his rationale on notifying Congress of his decision to reopen the probe of Hillary Clinton's use of a private email server and steps the bureau is taking to defend against the insider threat.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.