Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
Reports on the Ukrainian energy supplier hack have left many crucial questions unanswered: Who was involved, did malware directly trigger a blackout and are other suppliers at risk from similar attacks? Cybersecurity experts offer potential answers.
As security leaders accept that breaches will happen despite perimeter defense and counter measures, incident response becomes an important evolution in an organization's security posture. Arbor's Jeff Buhl discusses the Asian stance and maturity.
Expect rebooted European Union data privacy rules to drive organizations worldwide to begin minimizing the amount of information they collect and store on individuals in 2016, both to protect privacy as well as minimize the impact of data breaches.
What are some of the unique challenges Indian leaders will face in 2016? Intel Security's Jagdish Mahapatra shares insight on threats, emerging technologies and what Indian security leaders must do to assert their influence on enterprise security strategy.
The year 2015 will be remembered for the surge in massive hacker attacks in healthcare. But what lessons can healthcare organizations and their business associates learn from these data breaches?
As experts predict top threats and cybersecurity trends for 2016, it is critical to understand and analyse how security practitioners should defend their organizations against these emerging threats.
Organizations in all sectors need to develop an "early warning system" to detect insider threats, says Scott Weber, managing director at the risk management firm Stroz Friedberg.
Qatar's national cybersecurity agenda is designed to ensure that security policies help businesses strike the right balance between security and economic growth, says Khalid Al Hashmi, a top official in the Ministry of Information and Communications Technology.
Improving breach detection and defenses involves much more than buying the latest technology, warns security expert Haroon Meer. "We keep moving on as we try to solve new, shiny problems, which we then half solve, but we still haven't completely solved problems that we knew about 20 years ago."
The breaches of the infidelity online dating service Ashley Madison and toymaker VTech illustrate how cyber intrusions got worse in 2015, thanks to organizations failing to secure private information.
Four years after European criminals exploited EMV implementation vulnerabilities to steal an estimated $650,000, security experts say not all banks have adopted full fixes. But the payment card industry contends related mitigations are in place and working.
Adobe is warning Flash users to update their software immediately in the wake of zero-day attacks that can enable attackers to take full control of vulnerable systems. This year, Adobe has patched 316 bugs in Flash. Is it time for the plug-in to die?
A security researcher claims he's found an Internet-connected "leaky database" that is storing voter registration records for 191 million Americans. But who's apparently been leaving the information exposed?
As the US government enacts its Cybersecurity Information Sharing Act, the question becomes: Is India ready for such legislation? What bottlenecks await, and how effectively are public and private players engaged to tackle info-sharing challenges?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.