Retired Lt. Gen. Deependra Singh Hooda recommends applying military principles to assess and enhance cybersecurity readiness and organizational resilience of enterprises. By drawing parallels with military strategies, he stressed the need to prepare for and adapt to evolving threats.
Cyber insurance is just one piece of the puzzle to address rising cybersecurity issues. Cyber insurance is not a defense strategy but more of a risk transfer strategy that can save your skin if there is an incident, said Deepika Mathur, CEO of Markel India.
The hyperconvergence of the communication and computing technology of 5G and edge cloud to offer virtualized services to customers in the form of a "bank in a box" will redefine the way banks will operate in the future, said the Reserve Bank of India’s D. Janakiram.
The proposed Personal Data Protection and Privacy Bill, which was tabled in the Indian Parliament, needs to guarantee the fundamental right of privacy and have a methodology to establish a secure data flow across the border, under Section 17 of the IT Act, said retired Justice B.N. Srikrishna.
Indian national cybersecurity coordinator and retired Lt. Gen. Rajesh Pant says Indian enterprises need to start investing in cybersecurity to respond to increasing cyberattacks since cyberspace is now borderless and interconnected with little attribution.
The ICS/OT community attracted high-profile attention in 2022. Headlines around the world highlighted the motivation for targeting ICS/OT and underscored the impact of disruption beyond a business and into the community it serves.
Security researchers have uncovered more evidence that the North Korean Lazarus Group is responsible for the software supply chain attack on 3CX, a voice and video calling desktop client used by major multinational companies. Tools and code samples match previous Lazarus hacks.
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
Hackers have used a modular toolkit called "AlienFox" to compromise email and web hosting services at 18 companies. Distributed mainly by Telegram, the toolkit scripts are readily available in open sources such as GitHub, leading to constant adaptation and variation in the wild.
Three healthcare organizations joined the list of entities treating past use of tracking technologies in patient websites as a data breach reportable to federal authorities. The entities admitting such incidents are New York-Presbyterian Hospital, UC San Diego Health and Brooks Rehabilitation.
Security experts are urging users of IBM's Aspera Faspex file-exchange application to take it offline immediately unless they've patched a flaw being actively exploited by ransomware groups, including Buhti and IceFire. Separately, QNAP is warning customers to prepare for emergency security fixes.
A hacking group with apparent ties to Russia or Belarus has been using "simple yet effective attack techniques and tools" to gain access to multiple governments' email systems as part of apparent cyberespionage operations in support of Russia's invasion of Ukraine, researchers warn.
The industrial cyber threat landscape is constantly changing with new adversaries, vulnerabilities, and attacks that put operations and safety at risk.
Asset owners and operators like you need proactive, actionable information, and defensive recommendations to prepare for and combat the world’s most significant...
Learn how to align your leadership and implement a successful Operational Technology (OT) security posture.
As operational technology (OT) cybersecurity becomes a top priority from boardrooms to the manufacturing floor, CISOs and their teams must implement proven strategies to protect the business.
OT, however,...
Learn how to align your leadership and implement a successful Operational Technology (OT) security posture.
As operational technology (OT) cybersecurity becomes a top priority from boardrooms to the manufacturing floor, CISOs and their teams must implement proven strategies to protect the business.
OT, however,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.