Implementing and maintaining Payment Card Industry Data Security Standard (PCI DSS) is challenging in today's complex business and technology environments. Many financial institutions only partially comply. By incorporating PCI DSS into a holistic governance, risk and compliance (GRC) program, financial institutions...
Most sophisticated organizations have had their incident response plans in place for several years. But the landscape has changed, and incident response plans and planning that remain static are at risk of being counter-productive in today's environment. If you haven't dusted off your plan in even a couple of years,...
Many organizations are undergoing a transformation to support digital platforms and stay competitive; but in order to maintain security, they have to ensure that access to these platforms is limited and that security remains a priority. New vulnerabilities to cybercrime are being introduced through hybrid...
Bryce Austin is a certified chief information security manager who weathered the storm as a senior group manager at Target during the retailer's November 2013 breach - a breach that resulted in the exposure of 40 million payment cards and personally identifiable information linked to an additional 70 million...
It has been roughly two years now since the advent of the Retail Cyber Intelligence Sharing Center. How has information sharing improved cyber defenses? And how have criminals upped their game? Brian Engle of R-CISC shares insight.
Seasoned InfoSec leader Sapan Talwar discusses the differences within global organizational culture with respect to security and India, with specific emphasis on incident response and mobility, sharing his recommendations, insights.
Many media outlets have suggested that the recent arrest of a Russian computer programmer ties to the 2016 U.S. presidential election meddling blamed on Russia. But the only source for this supposed connection traces to a Russian propaganda arm that's been blamed for participating in said meddling.
Unified Endpoint Management affords you the opportunity to put your expensive and ineffective multi-solution dependencies behind you.
While UEM is valuable, it is just another tool. A better tool, but a tool nonetheless. UEM needs something else to make it invaluable.
When used in combination with cognitive...
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter.
In peeling back the onion,...
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees
use a variety of form factors, but they run a variety of platforms on those devices, including:
Apple iOS and Apple...
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae,...
As hacking incidents appear to spike again on the federal breach tally, a small Kentucky-based physician practice is the latest healthcare entity to report a major breach involving a ransomware attack.
Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, BitSight Technologies really is not seeing a decrease in the number of reported incidents.
Download this whitepaper that discusses:
The high rate of breaches reported by large...
Larger hospitals, especially teaching institutions, appear to be at greatest risk for health data breaches, says a new study. But what are the major contributing factors?
When it comes to the motivations driving Eastern European cybercriminals, "pseudo-anti-Americanism" is big, says Vitali Kremez, a researcher with intelligence firm Flashpoint who regularly infiltrates cybercrime forums.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.