In the latest blow to Kaspersky Lab, the U.K. government is warning that the Russian anti-virus vendor's software should not be used on computers that handle classified information. British bank Barclays has also ceased giving away Kaspersky's AV software to its customers.
In an era where users are working simultaneously across mobile, social and cloud applications and platforms, organizations need to deploy identity and access management solutions that can scale and adapt quickly. IBM's Sean Brown describes the rise of Identity as a Service.
Parliament to the populace: Do as we say, not as we do. How else to characterize multiple U.K. lawmakers' flagrant disregard for the data privacy laws that they themselves voted into effect?
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
The U.K.'s privacy watchdog has launched a probe after some Members of Parliament admitted they share email passwords or leave workstations unlocked. The MPs were attempting to defend a colleague who's been accused of downloading and viewing pornography on his work PC.
A report on the SEC targeting a Canadian company for fraud, alleging it cheated investors by exploiting a so-called Initial Coin Offering crowdsourcing funding system, leads the ISMG Security Report. Also, an NSA analyst pleads guilty in a case involving storing classified data on his home PC.
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
Denial of Service, web application layer attacks, credential abuse and IoT - these are the attack trends and vectors that will make headlines in 2018. Ryan Barnett of Akamai offers insight into how to prepare your defenses.
As data breaches increase in scale and frequency, businesses must ensure an effective, swift and well-orchestrated response. To help them, ISMG on Wednesday and Thursday will host a Fraud and Breach Prevention Summit in Mumbai offering insights from 20 leading CISOs and many other experts.
The timing of reporting breaches to law enforcement is important because it could slow down an organization's incident response and internal investigation, says privacy attorney Kirk Nahra.
More organizations are making a much-needed shift from using Security Operations Centers to support operations to using them as a strategic tool to help detect attacks and quickly set up response mechanisms, says Sameer Ratolikar, CISO at HDFC Bank.
Federal regulators are reminding healthcare entities and business associates of the serious security and privacy risks that terminated employees can pose and offering advice for mitigating those risks.
Compliance should be an ongoing operational business process designed to derive efficiency, scalability and insight, Sam O'Brien, RSA's GRC business lead for Asia-Pacific and Japan.
Medical devices are increasingly used by cybercriminals to compromise networks, systems and patient data, says Dr. Jack Lewin of the consultancy Lewin and Associates, who's also chairman of the National Coalition on Health Care. That's why physicians should be advocates for better device security.
The lack of skilled personnel is hampering incident response, but automation can help, says Mike Fowler of DFLabs. Providing responders with "playbooks" for step-by-step incident response processes, for example, is essential, he contends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.