The latest edition of the ISMG Security Report features an update on a congressional report that slams Equifax for lacking a strong cybersecurity culture. Also featured: A new study on the status of women in the cybersecurity industry and the use of Android phones as security keys.
To counter cyberwarfare, the government of India needs to deploy both preventive and predictive technologies, says Alok Gupta, founder and managing director at Pyramid Cyber Security and Forensics.
Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.
The Indian government is not doing enough to address cybersecurity issues for the upcoming national election, says cyber law expert Pavan Duggal, who offers a harsh assessment.
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.
When a company plans to make an acquisition, it should conduct a "compromise assessment" to assess whether the organization being purchased has had an undiscovered breach, says Steve Ledzian, CTO for Asia Pacific at FireEye.
The ISMG Security Report features Chris Painter, commissioner of the Global Commission on the Stability of Cyberspace, discussing cybersecurity policy for the 2020 U.S. elections. Plus, an update on the cost of the Norsk Hydro ransomware attack and the challenges of controlling real-time payments fraud.
An essential component of protecting payment information is devaluing the data that is transmitted so it's of no use to hackers, says Lance Johnson, executive director of the PCI Standards Security Council.
India is gradually entering into the league of those nations where critical infrastructure is controlled by the cyber architecture and therefore, naturally becoming an attractive target for the enemies of the state and countries, says S N Pradhan, director general of NDRF, Ministry of Home Affairs.
Despite organizations moving to the cloud, security leaders cannot afford to ignore traditional perimeter security, says Alvin Rodrigues, security strategist, Asia Pacific, at Forcepoint.
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.
The latest edition of the ISMG Security Report discusses the recent ransomware attack on aluminum giant, Norsk Hydro. Plus, confessions of a former LulzSec and Anonymous hacktivist, and the growing problem of cyber extortion.
In light of concerns raised about the security of electronic voting machines in India, Dr. Alok Shukla, former deputy election commissioner, says it's nearly impossible for a hacker to tamper with the chips in an EMV in an attempt to alter the vote tally.
The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service."
Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.