Information Security Media Group surveyed C-suite executives in Bangladesh, including CISOs, CSOs, CTOs, heads of risk and compliance and IT. The objective was to understand regional trends and key cybersecurity challenges and requirements. The survey aimed to explore current transformations in the cybersecurity...
This survey will gauge the current status of remote vs. office work, impacts to security programs and how security teams are prepared to overcome associated challenges.
This critical 2020 survey calls cybersecurity leaders in FedGov agencies in the UK, US and Middle East on trends in Remote Workforce, Election Security & Supply Chain Security.
Regulations such as Europe's Second Payment Services Directive (PSD2) are paving the way for open banking and a far more innovative financial services industry.
In the wake of digital transformation and several large, high-profile data breaches - and at a time where all the personal information is shared in the social network - traditional forms of digital identity verification are no longer valid.
Customers have zero patience for extra steps, and yet they expect their...
Distributed Denial of Service attacks - DDoS. They used to be nuisance crimes committed by gaming rivals and script kiddies. The stakes grew higher five years ago, with the rise of hacktivism and high-profile attacks on large U.S. banks. But even those attacks are minor when compared with today's huge, IoT...
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks, even months as they gather intel and prepare to strike. How prepared is your security organization to respond to these attackers? Is yours a proactive security posture...
In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable...
Ransomware dominated the headlines in 2016, as organizations of all sizes and sectors fell victim to malware that locked down, encrypted - and in some cases threatened to destroy - critical systems and data. But is ransomware truly as big a security challenge as it is a compelling story? And what lessons have...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.