Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
High-profile security breaches globally have had a cascading effect on Indian organizations. Intel Security's Chris Young discusses how Indian security practitioners must shift to a resilient security model.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
Fighting increased incidents of fraud is going to be a challenge, given lack of regulation, awareness and skills. Dhruv Phophalia, Head of Alvarez and Marsal's global forensics practice, offers insights.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
Financial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of it online. Find out how many clients were affected.
What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
Enterprises need to think beyond malware, breaches and insider threats when assessing information security. Keeping hardware up and running - available - is a crucial aspect of securing essential data.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.