Given that hacking is an everyday threat to most organizations, reliable security depends on understanding the exposure, weaknesses and threats that could lead to a breach in the defences, says PWC's Wouter Veugelen.
Just two weeks after an international, FBI-led operation disrupted the notorious hacking forum Darkode, leading to 70 arrests, a supposed site administrator has claimed the forum will reboot on the "dark Web." But security experts question those claims.
Shed a tear for enthusiasts of aging Microsoft Windows operating systems. That's because Microsoft has now retired Windows Server 2003 support, as well as anti-virus scanner and signature updates for Windows XP. But breaking up can be hard to do.
India has yet to experience a data breach on the scale of Sony or Home Depot. But the market is growing, and so are breach risks, says Kroll's Reshmi Khurana. How must security leaders prepare their organizations?
The U.S. Office of Personnel Management breach continues to reveal such staggering levels of information security problems, paper-pushing and seeming incompetence that it's creating a new cyber-espionage category: the "victim-as-a-service" provider.
Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
The alleged hack on Ola Cabs comes just months after AppSec experts called out Ola's Mobile app for security lapses. We take a closer look at the compromise with some expert help.
Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
High-profile security breaches globally have had a cascading effect on Indian organizations. Intel Security's Chris Young discusses how Indian security practitioners must shift to a resilient security model.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
Fighting increased incidents of fraud is going to be a challenge, given lack of regulation, awareness and skills. Dhruv Phophalia, Head of Alvarez and Marsal's global forensics practice, offers insights.
Businesses targeted by ransomware attacks are increasingly willing to negotiate with - and even pay - their extortionists. But negotiating with cyberthieves is never a good idea.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.