The endpoint remains the favored attack surface for criminals, yet most cybersecurity solutions rely on detection rather than prevention, says Gregory Webb, CEO of Bromium.
It's not just that threat actors are multiplying - it's that they have evolved to unleash a fifth generation of cyberattacks, says Peter Alexander of Check Point Software Technologies. And most enterprises are ill prepared to detect or respond to these attacks.
Identity is changing with the fusion of public and private trust models. Entrust Datacard's Ray Wizbowski discusses the shifting landscape and how best to secure it.
Organizations understand and appreciate the efficiencies and cost savings of moving to the cloud. But what are the potential impediments they often overlook? Peter Martini of iboss offers guidance.
The potential for DDoS attacks expands exponentially with IoT and digital currencies. But how significant is this DDoS threat? Leen Chen of A10 Networks offers an analysis.
In an in-depth interview, Golok Simli, CTO at India's Union Ministry of External Affairs, sizes up the shortcomings of the Information Technology Act, 2000 and discusses the ongoing challenges involved in protecting privacy.
In the latest in a string of government website defacements and hackings, the website of Supreme Court of India was defaced Thursday. The "HighTech Brazil Hackteam" was mentioned on the defaced site, according to news reports.
Centurylink is out with its 2018 Threat Report, and it contains curious insights into connected devices and the botnets that can leverage them for crime. Peter Brecl of CenturyLink shares highlights.
As corporate information silos fall, traditional approaches to governance, risk and compliance are giving way to the new category of integrated risk management solutions. Vivek Shivananda, CEO of Rsam, discusses the evolution.
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
After years of focus, the needle is moving positively toward improving medical device security. But what about the growing cybersecurity issues associated with enterprise IoT? Mac McMillan of CynergisTek shares his concerns.
Taking a threat-centric approach - trying to defend against every threat out there - is a recipe for failure in the current threat landscape, says RSA CTO Zulfikar Ramzan, who advocates a business-driven approach instead.
The Facebook/Cambridge Analytica scandal is far from over. Attorney Steven Teppler, co-counsel on the first class action case filed in the matter, discusses the likely repercussions.
Hot cybersecurity trends under discussion at this year's RSA Conference include artificial intelligence, facial recognition, protecting not just data but also knowledge, as well as rapid data breach response, says Chris Pierson, CEO of Binary Sun Cyber Risk Advisors.
Blockchain is high on the hype meter in 2018, but Gartner's Avivah Litan is encouraged by practical applications of the technology to secure financial transactions, protect identity and help organizations fight fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.