The UK's privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
Organizations are finding it hard to achieve their security goals with the supply of highly qualified security experts being low and the demand astronomically high.
The Information Security Officer (ISO) at a large bank, serving a variety of commercial businesses, construction companies and the farming community,...
There are millions of organizations attempting to ward off hackers, comply with regulations, keep their employee and customer data safe, measuring risk levels, all while creating or maintaining a resilient security culture.
Discover how Investors Bank leveraged Digital Defense's Vulnerability Manager™ to...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on July 27 a virtual cybersecurity summit for India on applying the model.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.
Although The Bangladesh Central Bank has mandated all banks in the country comply with the PCI Data Security Standard, many are not yet compliant, says Abul Kalam Azad, head of IT security and compliance at Eastern Bank, one of the nation's largest public sector banks, who offers tips on achieving compliance.
As the risks to IT and OT converge, organizations must ramp up their threat intelligence information sharing mechanisms and build a more comprehensive cybersecurity policy, says Singapore-based John Lee, managing director of GRF Asia, a federation for building global resilience.
Linda Gray Martin and Britta Glade, organizers of the three-day RSA APJ Conference that starts July 15, describe their efforts to create a virtual event to replace the usual gathering and provide an overview of educational content.
Using artificial intelligence and machine learning, bundled with an orchestration layer, will help CISOs mitigate cyberthreats, says Bharat Anand, chief of technology at NATGRID, the intelligence sharing network of the government of India.
A massive DDoS attack generating 809 million packets per second was recently directed against a large European bank, according to the security firm Akamai, which describes in a new report the unusual approach the attackers took.
A hacking group dubbed CryptoCore has stolen more than $200 million in virtual currency from several cryptocurrency exchanges over the past two years, the security firm ClearSky Cyber Security reports.
Vulnerabilities due to "coding errors" in a number of mobile banking applications make them all too susceptible to hacking and customer account data theft, the security firm Positive Technologies warns.
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.