Ransomware has ascended, by some estimates, to a $1 billion industry. Although the FBI advises against paying ransoms, some organizations see it as the quickest way to recovery. Michael Viscuso of Carbon Black says that the larger problem is a failure to defend networks.
As India prepares to develop a data protection law, it can learn from the experiences of other regions, especially Europe, says Shivangi Nadkarni, CEO at Arrka Consulting.
Launching effective user education as well as implementing the right endpoint security technologies are two essential steps to help mitigate the threat of ransomware attacks, says Ashish Sud of Sophos.
The exponential increase in encrypted internet of things traffic over the next few years will change security dynamics because most security solutions cannot process encrypted traffic, contends Sanjay Gangadharan of A10 Networks
Businesses need to transform their security operations, using threat intelligence to prioritize the risks they need to address, says Vivek Chudgar, senior director at Mandiant Consulting Services, APAC.
From worsening ransomware attacks to deepened concerns about external digital risk, former AT&T CISO Ed Amoroso says 2018 will be a challenging year, and security teams need to be building out their resiliency plans to prepare for what's ahead.
As the healthcare sector implements a variety of new applications and increasingly moves to the cloud, it has a fresh opportunity to address security, says Daniel Bowden, CISO at Sentara Healthcare, who discusses best practices.
This episode of the ISMG Security Report is devoted to producer/host Eric Chabrow's recollection of the evolution of cybersecurity news and analysis during his nine years at Information Security Media Group. Chabrow is retiring after 45 years in journalism.
Ensuring the integrity of data generated and emitted by medical devices is a growing concern as cyber threats advance, says cybersecurity expert Kevin Fu, who also discusses concerns about consumer-wearable health devices.
A successful privileged access management program has many critical components, including single sign-on, password management and provisioning and maintenance of privileged identity, says Anuj Tewari of HCL Technologies.
A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences.
Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.
Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
Since the massive data breach of credit bureau Equifax, the U.S. Congress has become more interested in the causes of data breaches. Australian security expert Troy Hunt, who recently traveled to Washington to share his insights with a House committee, discusses what he told lawmakers in this in-depth interview.
The desire to gain a competitive edge is beginning to drive security investments among companies in the region, says Nigel Ng, vice president, Asia Pacific and Japan, for RSA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.