In this edition of the ISMG Security Report: Privacy watchdogs in the EU begin enforcing GDPR in less than 30 days; are organizations ready? Also, a look at the top 10, real-world online threats facing business and financial software firm Intuit.
What are the best practices for addressing security in "smart city" projects? Vikas Kanungo, senior consultant, transport and ICT global practice, at the World Bank, offers insights in an in-depth interview.
Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview about the activities of a hacker group the company has dubbed "Orangeworm."
In an in-depth interview, Golok Simli, CTO at India's Union Ministry of External Affairs, sizes up the shortcomings of the Information Technology Act, 2000 and discusses the ongoing challenges involved in protecting privacy.
The European Union's General Data Protection Regulation, which will be enforced beginning May 25, potentially could evolve into a defacto global standard, says Pavan Duggal, advocate in the Supreme Court of India.
What's the difference between artificial intelligence, machine learning, deep learning and neural networks? Don't trust vendors' marketing materials to help you find a workable, accurate definition, says Kris Lovejoy, CEO of the security firm BluVector.
In this in-depth interview, Daniel Cohen of RSA discusses how open banking, also known as banking as a service, will affect the fight against fraud and offers insights on the security steps banks should be taking.
Verizon's latest Data Breach Investigations Report shows that half of data breaches in 2017 worldwide were orchestrated by organized cybercriminal groups, says Verizon's Ashish Thapar, who offers an in-depth analysis of the findings.
Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders.
Deception technology has been gaining traction as a way for organizations to get a view on how attackers are targeting their assets. Rik Turner, principal analyst at the consultancy Ovum, says he expects MSSPs to incorporate deception technology, making it more accessible to smaller organizations.
A new version of the FIDO authentication standard is designed to enable the elimination of passwords for a broader range of devices, says Phil Dunkelberger, CEO of Nok Nok Labs, who describes the latest developments.
Blockchain can be leveraged to help address certain security problems in millions of IoT devices, says Ratan Jyoti, CISO at Ujjivan Bank. In an interview, he describes the uses for blockchain he envisions.
While CISOs in India are fighting off threats from technologically adept cyberattackers, they are also grappling with the challenge of effectively communicating cyber risk to management in the business terms that they can understand, says K.K. Mookhey, founder of Mumbai-based NII consulting.
The recent data breach impacting 150 million user accounts of Under Armour's MyFitnessPal application and website offers important lessons for mobile app developers, security expert Joan Pepin explains in this interview.
With Alabama and South Dakota recently becoming the last two states to adopt breach notification laws, notification processes become more complicated, says privacy attorney Adam Greene, who offers an in-depth analysis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.