Organizations in India need to ramp up their authentication efforts in light of a 40% increase in cashless transactions since the start of the COVID-19 pandemic, which has led to increases in attempted fraud, security experts say.
In trying economic times, it's more important than ever to be able to measure and communicate the effectiveness of one's cybersecurity program. Colin O'Connor, COO of ReliaQuest, offers a new alternative to traditional metrics.
As the use of business-critical, cloud-based applications and tools continues to
increase, distributed organizations with multiple remote offices are switching
from performance-inhibited wide-area networks (WANs) to software-defined WAN
(SD-WAN) architectures. SD-WAN offers faster connectivity, cost savings,...
Digital transformation is a strategic initiative for the majority of distributed organizations in 2019. The need to support cloud-based applications across sites has led many organizations to switch from wide-area networks (WANs) to software-defined WANs in an effort to eliminate performance and operational...
Customers are turning to the cloud to reduce capital expenses and increase agility
as part of their digital innovation (DI) initiatives. Despite the benefits, cloud migration
results in business-critical data and services being scattered across clouds and data
centers. This leads to an expanded attack surface and a...
With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans in place to ensure uninterrupted service, says Srilanka-based Sujit Christy, global CISO at John Keells Holdings.
The new normal for many office workers is working from home (WFH), and they are finding many new challenges and dangers which comes with this. This is because 90+% cyber security attacks begin with email, and users are more at risk than ever of attack due to not having an IT department nearby or have the correct...
To deal with the problem of "shadow IT" during the COVID-19 pandemic, organizations should put in place redefined compliance and governance policies, take a multilayered security approach and adopt a security framework to prioritize risks, a panel of three experts advises.
As phishing campaigns and hacker attacks spread during the COVID-19 global pandemic, it's more important than ever for organizations to promptly report fraud to authorities to help them crack down on cybercrime, says Dr. Karnika Seth cyberlaw expert and advocate at Supreme Court of India.
The ransomware threat has scaled up to match the new remote workforce. But have backup policies and incident recovery procedures improved to keep pace? David Shaw and John Bilotti of Nasuni share tips on ransomware recovery, remote file-sharing and business continuity.
Singapore's open banking effort has expanded the attack surface, and the only effective defense is to enhance threat intelligence sharing among banks, retailers and third parties, says Tom Wills, a Singapore-based cybersecurity practitioner who is a consultant for financial institutions.
To ensure business continuity, companies that support India's critical infrastructure need to validate the functioning of the security controls and other tools deployed to support the remote workforce during the COVID-19 pandemic, says Mumbai-based Shivkumar Pandey, group CISO at the Bombay Stock Exchange.
Privileged access management is more critical as a result of the shift to telework during the COVID-19 pandemic and the ongoing movement of applications and data to the cloud, says Dr. Yask Sharma, CISO of a large national critical infrastructure organization in India, who outlines essential PAM components.
At a time when cybersecurity leaders are managing
business resiliency with the world's largest remote
workforce, how can enterprises remain both dynamic
and grounded in fundamental security controls?
Christopher Kloes, vice president of security at Unisys,
discusses this challenge.
Download this eBook to learn...