Large global organizations should have in-house forensic capabilities so they have a clear understanding of internal infrastructure and related vulnerabilities, says Sridhar Sidhu of Wells Fargo-India.
All companies must follow certain guiding principles when it comes to managing thousands of IoT devices, says security specialist Minatee Mishra of Philips HealthTech India.
Dharmaraj Ramakrishnan, senior director at FIS Global, sizes up the potential impact of data localization in India as well as the pending data protection bill.
Unlike the European Union's General Data Protection Regulation, the California Consumer Protection Act is very prescriptive in nature, says Subhajit Deb of Dr Reddy's Laboratories, a global pharmaceutical company. In a video interview, he offers compliance insights.
Data identification is challenging, especially for unstructured data, says Maheswaran S, regional director, India and SAARC, at TITUS, who says machine learning can help ease the process.
It's important to maintain a balance between protecting privacy and efficiently conducting business, says Rahul Matthan, a partner at the law firm Trilegal.
Post-GDPR, the California Consumer Privacy Act was the first piece of US legislation to emerge - but it's hardly the last. Attorney Sadia Mirza of Troutman Sanders talks about the potential impact of CCPA and other pending privacy legislation.
The right authentication controls at the right time for the right transactions - the adaptive authentication message is taking off, says OneSpan's Tim Bedard. And here are some quick wins organizations might focus on when starting down the path.
Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises. Dan Fitzgerald, a CISO at the consultancy McKinsey & Co., shares insights on how to make these transitions.
It's been nearly seven years since HSBC was fined $1.9 billion by U.S. authorities for money laundering violations involving international drug cartels. But Everett Stern, the former employee who blew the whistle on the bank, continues to tell his story because he believes similar criminal activity is ongoing.
Technology is making fraud faster to commit, but key methods remain unchanged, says Kenneth Citarella of Guidepost, who provides insights on fraud prevention strategies.
Phishing remains one of the most significant attack vectors, and security automation, orchestration and response, or SOAR, can help minimize the threat, says Myke Lyons of ServiceNow.
Strong business resilience metrics for measuring effectiveness, simpler networks and smaller tool sets are all needed to cope with the evolving threat landscape, says retired Major General Earl Matthews, senior vice president at Verodin.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.