Insider fraud is one of the biggest challenges facing Indian security practitioners, yet they struggle to respond to insider crimes, says Berjes Shroff, CISO of Godrej Infotech, and a speaker at the ISMG Data Breach & Fraud Prevention Summit Asia in Mumbai.
Singapore is considering data privacy and protection legislation soon, owing to strong support from the industry's data privacy and protection leaders. The government seems to be studying EU's General Data Protection Regulation closely to incorporate some elements.
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Close on the heels of the QNB leak, the same attackers have published data that appears to be from UAE-based InvestBank. The dump appears to contain payment card data, as well as a large number of sensitive, internal files relating to the bank's employees and systems.
In the aftermath of a media maelstrom surrounding an alleged hack, the IRCTC flatly denies any compromise, but it's anxious to verify data in police possession, which the authorities apparently have still not shared. Here's the full lowdown.
Have you tested things before they break? Could an email be a trap? In honor of Star Wars Day, we proudly present essential cybersecurity lessons as derived from - and delivered via - the wisdom and wit of the iconic space opera.
Even with the exponential increase in what technology can achieve in fighting security threats and fraud, a recent discussion with practitioners suggests that insider risk remains the biggest issue giving practitioners sleepless nights.
Two public sector banks recently were victims of data breaches. Experts shed more light on the possible vulnerabilities that banks and their customers have left unaddressed, and make recommendations to prevent future attacks.
Security experts worldwide are sorting through the implications of the so-called "Panama Papers" leak, involving 11.5 million records. The documents highlight an elaborate web of offshore holdings that everyone from heads of state to celebrities and fraudsters have allegedly used to hide billions of dollars.
Tools and techniques need to be identified to aid law enforcement in gathering evidence from devices, such as smartphones, while safeguarding the security and privacy of individuals. Can stakeholders find that middle ground?
Advanced attacks are out, while persistent, relatively simple attacks are in. Despite all of the APT hype in recent years, cybercriminals, and especially nation-state attackers, prefer to keep things simple. Information security experts explain why.
As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?