While the push for security in regulated industries is compliance driven, it's essential for organizations to also develop security strategies based on business risks, says A. Shiju Rawther, head of infrastructure and security operations at a leading credit-rating bureau in India.
Brazen ATM thefts from financial institutions in Taiwan and Thailand have sent a shiver through the global banking industry. An inside look at the malware used in the attacks reveals attackers' clever, incremental improvements.
Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
To keep up with emerging threats, banks and other organizations in Saudi Arabia and throughout the region must develop much more mature incident response functions, says Mohammed Almozaiyn, who heads incident response for a leading Saudi bank.
Given rapid adoption of SSL encryption to protect customer and corporate data, attackers are hiding in SSL traffic. These attacks are not visible to existing security solutions. Watch this video to learn how A10 Networks can help you eliminate SSL blind spots and help uncover hidden threats in SSL traffic while...
To detect and stop cyber attacks, Cisco customers must be able to inspect all traffic, including encrypted traffic. This video, sponsored by Cisco Security, shows how A10 Thunder SSLi intercepts SSL traffic and sends it unencrypted to Cisco FirePOWER or Cisco ASA platforms for inspection and attack prevention.
Many Asia-Pacific organizations are woefully unprepared to detect and respond to data breaches, according to Mandiant's M-Trends Report 2016. In fact, the report finds that the median amount of time it takes to discover an attack in the region is 520 days.
Cisco has begun releasing updates for all ASA devices to patch them against a buffer overflow vulnerability that was targeted by leaked Equation Group attack tools. Attackers can exploit the flaw to gain remote control of ASA devices.
Australia's postal service is researching the use of the public cryptographic ledger known as blockchain for e-voting applications, but experts cast doubt on whether the approach would help resolve the many worries around internet voting.
Encrypted traffic accounts for a growing percentage of network traffic. To stop cyber attacks, organizations must gain insight into encrypted data, and to do this, they need a dedicated security platform that can decrypt SSL traffic.
This paper describes five features that organizations should consider when...
Traditional firewalls and security systems can't keep up with the increasing onslaught of malicious encrypted traffic. To protect your data and your bottom line it's critical that you effectively inspect all SSL traffic. Download the eBook to learn the 6 keys for uncovering hidden threats, while ensuring performance...
Rising Cost of Breaches and Data Privacy Concerns Are Driving Encryption.
In response to the rising cost of cybercrime over the past several years, as well as concerns about protecting data privacy, organizations have increasingly adopted SSL encryption to safeguard their valuable information assets. It's expected...
Make sure that today's and tomorrow's most sophisticated hackers can't break through your corporate security defenses by hiding in SSL traffic. Defend your organization against malicious SSL traffic.
Historically HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and sensitive transactions in corporate information systems. Download the infographic to see how Internet security has evolved.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.