Combining the data analytics of Google Chronicle with Mandiant's ability to identify signals of abnormal behavior is an unbeatable combination, says Mandiant President and COO John Watters. Google agreed in March to purchase threat intelligence and incident response titan Mandiant for $5.4 billion.
Sandy Carielli, principal analyst at Forrester, shares research on the latest bot management trends. Forrester found that while bots affect security, e-commerce, marketing, fraud and other teams, security professionals are still the most common bot management users.
What makes authorized payment scams hard to detect? The speed and volume of transactions hinders banks in monitoring for fraud, but David Lott, payments risk expert with the Federal Reserve Bank of Atlanta, says educating customers and leveraging the right technology can help reduce scams.
In the latest weekly update, four editors at Information Security Media Group discuss key takeaways from ISMG's recent Government Summit, how hackers siphoned nearly $200 million from cryptocurrency bridge Nomad and how midsized businesses are the new frontier for ransomware.
Sri Lanka's national crisis has yet another downside: growing insecurity in cyberspace. Collapse of the Sri Lankan rupee has caused the price of cybersecurity product license renewals to skyrocket. Opportunistic hackers are drawn to the island. Cyber insurers are leery of renewing existing policies.
When choosing cyber insurance, follow the checklist of cybersecurity requirements the prospective insurer provides, but go beyond it to lower your premiums and avoid a "nasty surprise," says Jacxine Fernandez, vice president of IT at Bangalore International Airport Ltd.
Atlassian released a patch for a critical vulnerability in its workspace collaboration tool Confluence stemming from hard-coded credentials. The Australian company found no evidence of exploitation of the flaw that allows remote, unauthenticated attackers access to vulnerable servers.
To be cyber resilient, an organization needs visibility across the entire infrastructure landscape, says Venugopal Arcot, senior director and head of solution consulting at ServiceNow. He discusses including the board in security conversations and integrating enterprise data in one location.
The best protection against a ransomware attack is a very good backup policy, says Krishna Sastry Pendyala, partner, cybersecurity, at Ernst & Young. He discusses ransomware trends in Asia, how CISOs view the question of whether to pay a ransom, and where cyber insurance fits in.
Organizations are dealing with extraordinary circumstances. It’s easy to manage endpoints when the attack surface isn’t growing or lead digital transformation when it doesn’t need to happen overnight. But that isn't our reality. So how do you enable new and emerging technologies and facilitate digital...
Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
The U.S. Cybersecurity and Infrastructure Security Agency has begun issuing alerts about 56 flaws across operational technology equipment built by 10 different vendors. Researchers at Forescout Technologies say the flaws trace to poor design decisions by vendors.
Insurance claims being filed by ransomware victims are growing as criminals continue to hit businesses with crypto-locking malware. To avoid these claims, organizations can take a number of proven steps to better protect themselves, says Payal Chakravarty of Coalition.
Canada's Desjardins Group has reached an out-of-court settlement to resolve a data breach class action lawsuit. The breach, which the credit union group first disclosed in 2019, traced to a "malicious" insider who for 26 months had been selling personal details for 4.2 million active customers.
As shown by a recent survey conducted by the Information Security Media Group (ISMG) in conjunction with Palo Alto Networks and Accenture, patient care has never been more dependent on technology than it is today. We rely on technology to save lives, improve patient outcomes, expand quality and continuity of care,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.