At a time when fraud is attempted across multiple channels and customers still demand a frictionless digital experience, Kevin Donovan of Biocatch makes the case for organizations to embrace the tenets of continuous authentication.
A report on advances in authentication to secure a cashless economy leads the latest edition of the ISMG Security Report. Also, we analyze the record-shattering Anthem data breach settlement.
What can CISOs at banks do to help prevent fraud as the region, and in particular India, moves toward achieving a cashless economy? Theo Nassiokas, director, APAC cybersecurity, at Barclays Bank, offers insights in an in-depth interview.
Enterprises should be working overtime to eradicate "EternalBlue" from their networks since two massive malware outbreaks - WannaCry and NotPetya - have targeted the Windows flaw. But vulnerability scans show there's still work to be done.
Multifactor authentication is essential to securing mobile payments as part of a multilayered defense, says Michael Lynch of Inauth, who explains a fraud-fighting strategy.
In an in-depth interview, Bharat Panchal, CISO of NPCI, clarifies ambiguities regarding banks' ongoing migration to the Unified Payments Interface service and discusses fraud prevention efforts.
As the success of the WannaCry attacks, which impacted 150 countries worldwide, demonstrates, rapid development cycles make it difficult for organizations to mount effective defenses.
In the aftermath of the massive "NotPetya" malware outbreak that's been impacting organizations worldwide, Indian security experts detail immediate prevention and remediation techniques.
Because the Aadhaar identification system is now being used for purposes for which it was not designed, such as transaction authentication, the risks involved are growing, says cyberlaw expert Na. Vijayashankar.
Members of Parliament in Britain have had their remote email access suspended following an apparent brute-force hack attempt aimed at exploiting weak passwords to gain access to their accounts. Officials say fewer than 90 email accounts appear to have been breached.
It's easy to draw a direct link between high-profile breaches and the compromise of user credentials. But it requires a phased approach to actually improve privileged access management, says Barak Feldman of CyberArk.
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
Security practitioners in India need to have a better perception of threats and risks to build successful detection and defense strategies. That was one of the key lessons offered at ISMG's Fraud & Breach Prevention Summit in Bengaluru June 7.
A discussion analyzing the difficulty of striking a balance between IT functionality and cybersecurity leads the latest edition of the ISMG Security Report. Also featured: Updates on sizing up weaknesses in biometrics and the potential to exploit LED lights to leak sensitive data from routers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.