Unsupervised machine learning is essential to mitigate the sophisticated cross-channel fraud techniques attackers are using to take advantage of the multiple silos and security gaps at financial institutions, says ThetaRay's James Heinzman
Leading the latest edition of the ISMG Security Report: An analysis of why it may be too late to secure the 2018 U.S. midterm elections. Also: A close look at the Anthem breach lawsuit settlement and a report on ransomware recovery lessons learned.
If India's proposed data protection bill is enacted into law, Indian organizations that must also comply with the EU's General Data Protection Regulation would have to focus, first and foremost, on compliance with India's new law, says Rahul Sharma, founder of The Perspective, which focuses on cyber policy.
Apache has released an emergency fix for its Struts web application framework to patch a flaw that attackers can exploit to take full control of the application. Some incident response experts, based on the severity of breaches they've investigated, recommend dropping Struts altogether.
Blockchain has potential for identity-based applications, but there are many aspects of identity and access management that a blockchain alone doesn't solve, says Ian Yip of McAfee.
Microsegmentation is an effective way for defenders to limit the amount of access an attacker has inside a data center and stop lateral movement, says Stanley Hsu of Illumio.
Many organizations don't have a full grasp of their digital footprints, which attackers analyze closely when plotting intrusions, says Hans Barre of RiskIQ.
Artificial intelligence can be used to create a model of an organization's infrastructure that can make detecting ransomware easier, says Alberto Pelliccione of ReaQta.
Australia is taking an aggressive approach to securing its critical infrastructure, which is vital to public safety and the economy, says Australian Member of Parliament Gai Brodtmann.
The quality and completeness of data is key to being able to perform meaningful analytics to detect malicious events, says Damien Smith of Australia's ANZ Bank.
Business intelligence technologies are increasingly being used with artificial intelligence to extract events that defenders need to know about, says Anurag Sanghai of Intellicus.
Layering defenses and maintaining strong security postures help mitigate risks as an organization's attack surface expands, says Narelle Devine, CISO of the Australian Department of Human Services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.