Response to supply chain attacks has evolved thanks to increased awareness and education, but more work needs to be done to understand how challenges can be addressed more systematically, says Sean Duca, vice president and regional chief security officer, Asia-Pacific and Japan, Palo Alto Networks.
A large number of security practitioners still don't understand the difference between security of the cloud and security in the cloud, says Archit Rajesh, group CISO at TeamLease, a human resources company headquartered in India. He discusses the complexities of cloud security.
Increasingly, executives are asking their security teams to secure all application secrets – everywhere across their entire organization. A potentially daunting task.
Where do security teams begin? This eBook outlines a practical systematic approach and blueprint for organizations to take to enhance the security...
This KuppingerCole report is designed to help organizations interested in securing their DevOps and Agile IT environments gain a greater understanding of the needs and requirements.
The report addresses:
How DevOps environments and Agile IT can result in an expanded attack surface
The top ten requirements...
Sandy Carielli, principal analyst at Forrester, shares research on the latest bot management trends. Forrester found that while bots affect security, e-commerce, marketing, fraud and other teams, security professionals are still the most common bot management users.
What makes authorized payment scams hard to detect? The speed and volume of transactions hinders banks in monitoring for fraud, but David Lott, payments risk expert with the Federal Reserve Bank of Atlanta, says educating customers and leveraging the right technology can help reduce scams.
In response to the spread of the COVID-19 virus, organizations of all sizes are rapidly scaling their support for a remote workforce. In addition to the strain this puts on IT support and helpdesk teams, it raises critical operational and security challenges. For most organizations, supporting remote employees isn’t...
In the latest weekly update, four editors at Information Security Media Group discuss key takeaways from ISMG's recent Government Summit, how hackers siphoned nearly $200 million from cryptocurrency bridge Nomad and how midsized businesses are the new frontier for ransomware.
Sri Lanka's national crisis has yet another downside: growing insecurity in cyberspace. Collapse of the Sri Lankan rupee has caused the price of cybersecurity product license renewals to skyrocket. Opportunistic hackers are drawn to the island. Cyber insurers are leery of renewing existing policies.
When choosing cyber insurance, follow the checklist of cybersecurity requirements the prospective insurer provides, but go beyond it to lower your premiums and avoid a "nasty surprise," says Jacxine Fernandez, vice president of IT at Bangalore International Airport Ltd.
Atlassian released a patch for a critical vulnerability in its workspace collaboration tool Confluence stemming from hard-coded credentials. The Australian company found no evidence of exploitation of the flaw that allows remote, unauthenticated attackers access to vulnerable servers.
To be cyber resilient, an organization needs visibility across the entire infrastructure landscape, says Venugopal Arcot, senior director and head of solution consulting at ServiceNow. He discusses including the board in security conversations and integrating enterprise data in one location.
The best protection against a ransomware attack is a very good backup policy, says Krishna Sastry Pendyala, partner, cybersecurity, at Ernst & Young. He discusses ransomware trends in Asia, how CISOs view the question of whether to pay a ransom, and where cyber insurance fits in.
Organizations are dealing with extraordinary circumstances. It’s easy to manage endpoints when the attack surface isn’t growing or lead digital transformation when it doesn’t need to happen overnight. But that isn't our reality. So how do you enable new and emerging technologies and facilitate digital...
Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.