Reducing security complexity remains one of the toughest challenges facing CISOs, driven by the non-stop increase in threats, says Jeff Reed senior vice president of product at Cisco Security Business. Creating a sustainable solution will require advances in vendor interoperability, as well as automation and...
The attack surface is constantly expanding, with threats continuing to keep pace with the evolution in infrastructure and digital transformation, says Leah MacMillan, chief marketing officer of Trend Micro.
In an in-depth interview, two cybersecurity experts at Akamai Technologies India discuss ensuring security for at-home workers during the COVID-19 crisis and offer business continuity insights.
As COVID-19 spreads, cybercriminals are sending more phishing emails that use the health emergency as a lure, according to security researchers. The European Central Bank is among those issuing warnings.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.
Careless and malicious insiders, overly complex IT infrastructure and having an excess of privileged users continue to pose serious risks to the integrity of corporate cybersecurity practices, says Timothy Brown of SolarWinds.
The state of endpoint security might appear good at first glance, but look below the surface and the situation may not be as rosy as it seems, says Christy Wyatt, CEO of Absolute, based on her company's new "2020 Endpoint Resilience Report."
Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years. Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector.
Today's "deepfake" technology makes the voice channel a nascent avenue for fraud. Mark Horne of Pindrop describes new threats to interactive voice recognition channels.
As consumers and organizations demand more stringent identity and access management controls, self-sovereign identity management can play a critical role, says Heather Dahl of the Sovrin Foundation.
New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions.
As cloud-first and cloud-native become more common labels in the industry, organizations are focusing on achieving visibility and operational excellence, says Trend Micro's Wendy Moore.
The California Consumer Privacy Act, the EU's General Data Protection Regulation and other privacy laws are focused on making enterprises and boards of directors more accountable, says Marc Cohen of ePlus Technology, who discusses compliance issues.
Harvard Kennedy School Professor Juliette Kayyem - well known as a CNN cybersecurity analyst - spoke at RSA 2020 and visited ISMG's studios to share insights on nation-state threats and election security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.