Hackers stole $100 million from the Bangladesh Bank after apparently obtaining payment-transfer codes and moving the money overseas in what experts say appears to be one of the largest bank heists in history.
Automated threat intelligence sharing can significantly reduce the amount of time it takes organizations to identify, assess and react to attacks, according to new research from Johns Hopkins. Mark Clancy, CEO of Soltra, says automated information sharing with government and other sectors is catching on.
nullcon has made a name for itself with its forward-looking philosophy - "The Next Security Thing!" We take a look at some of the hot sessions and events slated to take place at the security marathon this year.
Mass targeted attacks often need a big event as the pivot to grab the prospective victims' attention. Using the example such of a phishing campaign, Symantec's Narang shares insight on how low awareness impacts the region.
The Internal Revenue Service has temporarily deactivated an online PIN-retrieval tool meant to prevent stolen Social Security numbers from being used to file fraudulent returns after finding that hackers had successfully subverted the system.
Cloud-based cybersecurity solutions increasingly are becoming the best option for securing websites while simultaneously speeding up web page load times for your customers. In addition, cloud-based edge solutions like CloudFlare also block threats through website application firewalls, DNS services and DDoS...
The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
Malwarebytes has long been a force in the consumer space, but now its focus is on enterprise breach remediation. In this video interview, Pedro Bustamante explains the enterprise strategy and discusses proactive malware hunting.
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Simple conversations live at the heart of business. Migration to SIP enables you to have those conversations with customers, colleagues and partners with far greater reliability and security - and at significantly lower overall costs.
Download this infographic to explore the benefits of SIP and what to expect...
The cyberattacks that we've seen in the healthcare sector over the past year are starting to rewrite the rules for healthcare-related businesses in a way we really haven't seen before. How are you upping your game?
It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
Could computing has gone from being the latest and greatest in technology innovation, to being the norm today. And security of data in the cloud is a concern that is constantly growing. WinMagic COO Mark Hickman shares challenges, advice.
HTTPS isn't what it used to be. In this whitepaper, you'll learn SSL/TLS best practices for securing modern websites, such as HSTS header support, use of SHA-2, and enabling forward secrecy. But, modern SSL doesn't just better secure your site; it's designed for performance, too.
You'll also discover some common...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.