Attacks against the cloud, using the cloud for command and control of malware attacks, and securing endpoints are posing big worries for all industries, says Brian Kenyon of Blue Coat Systems.
Identity management is going to be a big issue in 2016, and emerging authentication tools, such as biometrics, could very well gain a more significant foothold, although not without posing new risks, says Steve Martino, CISO at Cisco Systems.
The ISMG team concluded its video interviews at the RSA Conference on Wednesday, March 2. And in many ways, they saved some of the best for last. Editors Tom Field, Tracy Kitten and Mathew Schwartz discuss highlights of their conversations.
IT security is amidst a seismic transformation, and the evolution requires a particular set of technologies and skills. In this interview, Greg Bell of KPMG offers insights on how security leaders can prepare for change.
Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. In this video interview, Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.
As millennials come to represent more than 50 percent of the population, that dynamic changes global payments - and fraud. In this video interview, David Sylvester of Easy Solutions discusses new strategies to help protect users from their own behavior.
The complexity of cybersecurity creates new headaches for organizations, says John Peterson of Comodo. The cure? Specialized threat analysis and protection. In this video interview, Peterson discusses how to implement this new model.
It has become accepted in many security corners that "breach is inevitable." But Rohyt Belani, CEO of PhishMe, rejects that notion. In this video, learn how he believes organizations should be arming their employees to help fight back against attackers.
Fraud and security teams have been converging for years, and now they have some common technology tools that can meet their unique and shared needs. How best can they manage convergence? Joe Nocera of PricewaterhouseCoopers offers insights in this video interview.
After a long career in the Secret Service, Steven Bullitt has joined Solutionary as its new vice president of cyber forensics and investigations. In this video interview, he explains the new perspective he brings to cybercrime defense and investigations.
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
Avivah Litan, Art Coviello, Raj Samani. These are among the thought leaders who were to meet with ISMG's editors at the RSA Conference on Wednesday. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview.
From the moment the RSA Conference 2016 launched, speakers began debating the merits of the Apple/FBI case. Eminent cryptographers, NSA Director Mike Rogers and U.S. Attorney General Loretta E. Lynch all offered related opinions.
The impasse over whether Apple should help law enforcement open encrypted iPhones continued during a House hearing, as FBI Director James Comey and Apple's top lawyer, Bruce Sewell, didn't budge from their positions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.