Many organisations understand that in today's enterprise technology landscape, the traditional network perimeter approach to defending against cyber threats is not enough to ensure a cyber resilient environment. This has given rise to the concept of identity being a key focal point in any cybersecurity strategy. Ian...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Cyber-intelligence expert Tom Kellermann sees a growing hostility in cyberspace, and he fears a new wave of advanced threats aimed not just at committing crimes, but at breaching critical infrastructure. Who are the top threat actors, and what are their key targets?
Cybersecurity incidents have evolved considerably since the TJX and Heartland breaches of 2007-08. And so has the discipline of incident response, says former prosecutor Kim Peretti, now a partner at the law firm Alston & Bird. She defines incident response 2.0.
Russian threat intelligence firm Group-IB alleges that North Korea is behind recent attacks against financial institutions in Europe employing fraudulent SWIFT messages. But other experts caution that such conclusions shouldn't be made solely based on technical data.
In this special edition of the ISMG Security Report, you'll hear an edited version of an ISMG Fraud and Breach Prevention Summit keynote panel in which current and former federal cybersecurity officials assess the IT security agenda of the Donald Trump administration.
Organizations must radically shift priorities, technologies, and resources. We have to acknowledge that in today's modern enterprise, we cannot rely on prevention based on static rules or prior knowledge. The vast majority of the security spend is still preventative and perimeter-based. Monitoring and response lag,...
The Indian Railways' free Wi-Fi network was affected more than any other ISP in India by WannaCry, according to a report from eScan. Some experts say the disruptions could have been avoided if the organization maintained basic security hygiene and blocked its excessive SMB traffic.
British Airways grounded all flights at London's two biggest airports starting Saturday, leading to multiple days of disruptions. The airline has blamed a power surge for its IT failures, but experts have questioned the airline's resiliency and disaster recovery planning and testing.
Restaurant chain Chipotle Mexican Grill says customers' payment card data was stolen via point-of-sale malware installed at the vast majority of its more than 2,000 restaurant locations for more than three weeks.
Leading the latest edition of the ISMG Security Report: Secretary John Kelly's congressional testimony on how DHS led government efforts to mitigate the WannaCry ransomware attacks. Also, reports on ransomware defenses as well as big data and machine learning combining to secure IT.
The identity of the individual or group behind the global WannaCry ransomware campaign remains unclear. But whoever wrote the ransom notes appears to have been fluent in Chinese and pretty good at written English, according to a linguistic analysis from security firm Flashpoint.
When it comes to breach preparation, it isn't just about protecting IT assets. Increasingly, the conversation is about reputational risk management, says Jacob Olcott of BitSight Technologies.
In an interview about reputational risk management, Olcott discusses:
The intersection of cybersecurity with...
A new phishing site just popped up targeting your online banking customers. Many of your end users who land on the page won't realize they're about to disclose their login or payment card information to fraudsters.
How can you help your customers before they disclose their credentials?
Download this whitepaper...
PSD2 both presents opportunities and introduces new requirements for banks. Proactive, early-adopting organizations will be able to meet the new demands rapidly. By creating new alliances and providing innovative services, they will be able to provide value for both themselves and their customers.
Download this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.