According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The questions raised: What are the applications of a...
ISMG's Security Summit in Mumbai on Nov. 29 will offer insights from CISOs and other experts on hot topics, including setting the boardroom security agenda, using cyber threat intelligence, preventing fraud through the use of blockchain, securing digital payments and preparing for a breach notification law.
A new exploit opportunity has fallen into the laps of Cybercriminals. They have now set their sights on the virtual (and volatile) world of cryptocurrency. Since the start of 2017 various currencies have rocketed and tumbled in value - this represents a valuable new opportunity for cybercriminals to increase their...
An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management.
As organizations investigate public and private blockchains to secure transactions and facilitate peer-to-peer transactions, they must ensure they know who's responsible, what the system is doing, what the cybersecurity and legal risks are and who's managing it, says attorney John Salmon.
Among cybercrimes, financial fraud in particular can be notoriously hard to detect and easy to cover up. But is blockchain technology, with its distributed digital ledger, a new tool to help organizations reduce risk and improve the overall cybersecurity posture? Or is it potentially a source of further cybersecurity...
Cryptojackers and eavesdroppers are continuing to exploit a one-time zero-day flaw in unpatched MikroTik routers, despite a patch that's been available for six months as well as the actions of a vigilante "gray hat" hacker who's forcibly "fixed" 100,000 vulnerable routers.
An analysis of attacks against cryptocurrency exchanges over nearly two years shows hackers have inflicted $882 million in damages, according to the Russian security firm Group-IB. The tally of losses is likely to grow next year, the company warns.
At RSA Conference 2018 Asia Pacific & Japan, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.
Researchers say hackers are increasingly using Indian government websites to mine cryptocurrencies. Security experts urge government authorities to take steps to mitigate the risks of cryptojacking, which can cause performance problems.
Blockchain is one of 2018's top buzzwords, but - cryptocurrency usage aside - the technology's practical applications are more hype than reality, says Gartner's Avivah Litan. But that doesn't mean blockchain lacks promise.
To comply with the EU's General Data Protection Regulations, organizations should implement several best practices, including the anonymization of data, says Sandeep Arora, former CEO at AXA Business Services, India, and co-founder of CyberImmersions Solutions.
Blockchain has potential for identity-based applications, but there are many aspects of identity and access management that a blockchain alone doesn't solve, says Ian Yip of McAfee.
The best way to take a holistic approach to the current threat landscape is to define security issues as business problems and then put the problem before the solution - not the other way around, contends RSA CTO Zulfikar Ramzan.
A number of innovative applications of blockchain technology for security are emerging, but Laurence Pitt of Juniper Networks warns that not all data is suitable for storage in a blockchain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.