Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Too many businesses assume that the internet will be around forever, but that's faulty thinking and an impractical business practice, says Information Security Forum's Steve Durbin, a featured speaker at Information Security Media Group's Fraud and Breach Prevention Summit in Atlanta this month.
Cloud services firm Coupa is one of the latest business email compromise victims, after a fraudster pretending to be its CEO faked out the HR department and stole all of its 2016 employees' W-2 forms. Security experts say rigorous training remains the only viable defense.
For any of the tens of thousands of organization that may be smarting from this week's Amazon Web Services and Simple Storage Solution (S3) outage, take the following advice to heart: "You must kill your darlings."
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
The Internet Archive, a pioneering 20-petabyte digital repository, is raising funds to replicate its data in Canada. The group's founder fears that the election of Donald Trump as the next U.S. president portends an uncertain privacy rights future.
Adopting standardized best practices, as embodied here in Hitachi ID Identity Express, has a positive impact on Identity and Access Management (IAM) implementation and operation. IAM implementation using Identity Express is faster, costs less and incurs less risk since operation is optimized, incorporates rich...
Cybercriminals are continuing to refine their art: Researchers say there are now more than 200 ransomware families, which complicates ongoing attempts to disrupt such attacks.
Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes, CTO at Trend Micro.
The dark web is one of the most commonly occurring, but most poorly defined terms in information security. The dark web is actually smaller than most of the mythology would have you believe. Another common myth is that the dark web is entirely used for criminal activities. While criminal activities do abound,...
Delta is warning that a power failure lead to system outages, resulting in numerous flight cancellations or delays. As more airline-related processes get computerized, experts are asking why the airline's systems aren't more resilient.
Although there's growing awareness of the need to build a cyber resilient ecosystem, the lack of a formal and strong framework is a big hurdle, says Preet Paramjit Singh of Tata Consultancy Services.
Ahmed Baig, founder of the CISO Council of UAE, says security leadership via fear, uncertainty and doubt is a thing of the past. In fact, future CISOs who use those tactics might find themselves ostracized and doomed to fail.
Amidst the tragedy of the urban flooding disaster in Chennai, businesses running critical operations are turning to business continuity management to resume operations. Thought-leader and former CISO Vishal Salvi shares advice.
To build a resilient and secure enterprise, security leaders must take a risk-based approach and build the capabilities to understand the risk appetite of the organisation, says Gartner's Tom Scholtz.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.