At its core, cybersecurity is about applying scarce resources to the highest risk. And nothing quite puts that tenet to the test like the COVID-19 pandemic. Jim Routh, CISO of MassMutual, discusses the challenges of managing a remote workforce and third-party relationships during this crisis.
A variant of the TrickBot Trojan bypasses two-factor authentication for mobile banking, for example, by intercepting one-time codes sent over SMS, according to IBM X-Force.
The FBI this week seized the domain of Deer.io, which federal authorities describe as a clearinghouse for stolen data and cybercriminal services operating from Russia. The alleged administrator of the now-shuttered site has been arrested and charged.
Innovation, consolidation and integration will be key areas of focus for Symantec's enterprise security business following its acquisition by Broadcom, says CTO Paul Agbabian.
At a time when cybersecurity leaders are managing business resiliency with the world's largest remote workforce, how can enterprises remain both dynamic and grounded in fundamental security controls? Christopher Kloes of Unisys discusses this challenge.
A hacking group targeted the World Health Organization earlier this month with an apparently unsuccessful spear-phishing campaign designed to harvest credentials as the United Nations organization was grappling with the global COVID-19 pandemic.
Data segmentation remains one of the big challenges for data governance, says Nirupam Srivastava, vice president for strategy, AI and digital transformation at Hero Corp.
Can quantum cryptography help in containing malware-as-a-service? Kiran Sivakumar, superintendent of police, Central Bureau of Investigation, GoI, says that while there isn't any real case study yet, he is hopeful that the technology will play a future role in combating the menace of this type of cybercrime.
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.
Microsoft is warning that attackers are exploiting a pair of critical, zero-day flaws in Windows that allow for remote code execution, which could enable a threat actor to take over an infected device. Although a patch for the flaws is not expected until April, the company described workarounds.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
Following the Bangladesh Bank heist in 2016, many banks in the nation have invested in new technologies, including SOCs, to better detect and analyze threats, says cybersecurity expert Rubaiyyaat Aakbar, who formerly worked at several local banks.
Finastra, a large financial services software provider based in London, continues to recover from a ransomware attack that forced the company to take its IT operations offline Friday to prevent further damage to its corporate network, according to the company's CEO.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.