Banking is undergoing a massive shift that began with the automated teller machine, continued with online banking, and is now accelerating with the advent of mobile computing. It wasn't that long ago that banking customers were limited to the branch on Main Street. Teller services were confined to the 10 a.m. to 3...
Financial services firms are facing a new set of challenges and risks. In an increasingly global, mobile and connected world, customers can come from anywhere and they can leave in a heartbeat. But they are also interested in consolidating their banking wherever possible, and they expect the companies with whom they...
High-profile security breaches globally have had a cascading effect on Indian organizations. Intel Security's Chris Young discusses how Indian security practitioners must shift to a resilient security model.
For years, security leaders have struggled to find the balance between ensuring strong security and maintaining customer convenience. Benjamin Wyrick of VASCO Data Security says mobility may be the answer.
Information is exponentially more valuable when it is easy to access, consume and share, which is why getting the most from your enterprise content requires more than just effective management. You also need to provide your employees with a superior user experience. That's particularly true given recent trends toward...
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
The Data Security Council of India appoints Rama Vedashree as its interim CEO as Dr. Kamlesh Bajaj retires. What is the legacy of Bajaj, and what are the security challenges awaiting his successor?
The Government of India has established National Cyber Co-ordination Centre to handle increasing threats. Can NCCC effectively coordinate with private-sector bodies to drive cybersecurity initiatives?
Researchers at Kaspersky Lab have released information on a denial-of-service bug, dubbed "Darwin Nuke," found in Apple's operating systems. Security experts weigh in with recommendations.
New NIST guidance is aimed at helping organizations to better understand the risks associated with the information and communications technology supply chain, says Jon Boyens, a NIST senior adviser.
Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.
While Indian companies increasingly are getting PCI-DSS certified, a vast majority fail their interim assessment. Where are the security lapses? Ashish Thapar offers insights from Verizon's new report.
Protecting valuable assets requires a layered security approach. Consider that when historic sites and museums implement security plans to protect priceless treasures, their plans go far beyond simply locking their doors at the end of the day. Rather, they employ a layered security approach that includes 24x7 security...
While security attacks on big businesses dominate the headlines, midsized organizations are a highly attractive target for cyber criminals. Unlike large enterprises that have large IT departments with dedicated teams focused solely on security, midsized organizations must protect a growing amount of valuable...
When a user logs in to your web applications, are you sure she is who she claims to be? And are you sure the social media site and the phone she is using for access are secure? Or have they been compromised to steal information? As enterprises begin to open their IT systems to a larger number of consumers, employees...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.