Organizations in the APAC region are not immune to the impact of the SolarWinds supply chain hack, so it's essential that they reassess their risk management practices and audit their suppliers, two security experts stress.
President Joe Biden's COVID-19 response strategy calls for an assessment of "ongoing cyberthreats and foreign interference campaigns targeting COVID-19 vaccines and related public health efforts."
In defining an IAM strategy for the cloud, CISOs need to automate the processes of provisioning, de-provisioning, monitoring and auditing as well as implementing federated access and API integration, says Rushdhi Mohammad, information security officer at the Industrial Bank of Kuwait.
The Department of Health and Human Services has slapped Excellus Health Plan with a $5.1 million settlement in the wake of a 2015 data breach that affected more than 9.3 million individuals.
The physical breach of the U.S. Capitol by a violent mob, members of which allegedly accessed lawmakers' systems and stole devices, offers cybersecurity professional lessons to learn on authentication, encryption and more, says cybersecurity expert Brian Honan.
See why Forrester analysts rank IBM as a Leader for risk-based authentication in this new report. We believe that IBM's integration of our fraud protection and access management technology, advanced authentication options, and risk-based adaptive access capabilities helped us earn this recognition.
Register now to...
Cybersecurity is a legitimate - and significant - business risk, and it's time to frame the topic appropriately, says Robert Hill, CEO of Cyturus. He shares insight on how to discuss cyber risk appropriately with C-level leadership and the board of directors.
Networks are fundamentally changing as a result of data being used across cloud environments. So security must be built into networks to improve mitigation of cyberthreats, says Nick Savvides, senior director of strategic business, APAC, at Forcepoint.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
With COVID-19 as a backdrop and 5G on the horizon, what will be 2021's top issues in identifying, protecting and defending against attacks across a dramatically expanded threat landscape? This latest CEO/CISO panel addresses the challenges of the new year.
The year 2021 will see an increase in third-party risks, the evolution of MSSPs, and maturity in identity governance as enterprises in the Middle East region take a fast track approach to the 'cloud-first' strategy, according to a panel of experts.
Payments companies must secure their APIs and enhance their authentication standards in line with The Reserve Bank of India's guidelines to make QR codes interoperable and boost the electronic payments ecosystem.
COVID-19 infections are hitting new daily highs in the U.S., and some European countries are re-imposing restrictions. Plus, the flu season is just around the corner. "We're in a bad place," says pandemic expert Regina Phelps, who shares insights on pandemic trends and response.
In 2019, the IBM Institute for Business Value Performance Data and Benchmarking Program worked with Oxford Economics to measure the performance/effectiveness and maturity of the Mergers and Acquisitions (M&A) functions of 720 acquirers in the electronics, chemicals and petroleum, healthcare and pharma industries....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.