More organizations in the APAC region that are taking advantage of cloud-based services are demanding cloud security access brokers capabilities for better visibility and data security, says Sid Deshpande, principal analyst at Gartner.
Blockchain technology already underpins the boom in cryptocurrencies, but it is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.
Orwell got it wrong: People are less likely to surrender their privacy to a totalitarian state than to the lure of sharing holiday snaps, cat videos or the route and time they took for their latest cycling, jogging or kiteboarding outing, as captured by a wearable fitness device.
As a long-time security leader, Qualys CISO Mark Butler has watched the evolution of security tools and platforms. The best-of-breed approach still has value, but also has failed us, he says. How can automation and orchestration provide new business value?
In a budget speech, India's finance minister announced the launch of a "cyberspace mission" and an effort to promote the use of several new technologies, including blockchain, to bolster the nation's data security. Security experts offer mixed reviews of the announcements.
On cybercrime forums and darknet marketplaces, there's an abundant supply of cybercrime products and services and lots of demand, plus prices remain low, says Flashpoint's Liv Rowley. All that's needed to leverage the products and services to make a profit, she says, is a bit of knowledge.
As RBI reports an increase in transactional fraud in India, the government is reviewing the financial sector's security posture in light of the nation's move toward a cashless economy. Security experts discuss the methods for effective fraud control.
Fitness app and website developer Strava has landed in hot water after publishing a global heat map that shows users' workout routes in aggregate. By doing so, the firm has inadvertently revealed military installation layouts and other sensitive information.
How effective are nation-backed trolls at influencing individuals via social media? An analysis of Russian trolls' accounts suggests they're designed for "causing havoc by pushing ideas, engaging other users or even taking both sides of controversial online discussions."
The White House, fearing China is spying on phone calls, has suggested that the U.S. government take a primary role in marshaling the development of secure 5G networks. But would nationalizing 5G networks make them more secure?
How bad does a third-party fix have to be for Microsoft to issue a rare, weekend update that helps IT administrators disable it? A security update from Microsoft allows users to disable a faulty Intel firmware update that can lead to frequent rebooting as well as lost or corrupted data.
In the wake of a ransomware attack that disrupted patient care services for hundreds of Allscripts' customers, a class action lawsuit has been filed against the cloud-based electronic health records vendor for allegedly "failing to secure its systems and data from cyberattacks."
How much does it cost to buy cybercrime-enabling products or services? Just $5 and up, security researchers say. Law enforcement agencies warn that small-time players as well as "serious and organized" crime rings are using cybercrime as a service to make illicit profits.