Financial losses and trauma experienced by the victims underscore the need to combat pig-butchering scams through concerted public-private collaboration, says Erin West, deputy district attorney at Santa Clara County. She suggests a three-pronged mitigation strategy: educate, seize and disrupt.
Organizations with a security-by-design approach need to go beyond being reactive to a proactive, offensive strategy to strengthen their security posture, says Mrutyunjay Mahapatra, member board of directors and chairman of the audit committee at Reserve Bank Innovation Hub.
How has cybersecurity technology evolved, and are legal frameworks keeping pace with the evolution? Dr. Pavan Duggal, an advocate at the Supreme Court of India, shares his journey and talks about his passions.
Ransomware gets the headlines, and phishing sets off the most alerts, but business email compromise costs enterprises the most - more than $43 billion since 2016. U.S. Secret Service agents Stephen Dougherty and Michael Johns discuss the criticality of rapid detection and response.
Organizations in all sectors need to build a continuous monitoring and response mechanism to defend against ransomware attacks, according to a panel of security experts from the Middle East
The adoption of the Secure Access Service Edge, or SASE, model is being driven by numerous factors, including the need to bring down administrative costs and to effectively manage network security, according to a panel of experts who offer implementation advice.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
Because so many organizations and government agencies are functioning in silos, a key component to India's soon to be finalized cybersecurity policy is the creation of an interministerial task force to respond to growing threats, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.
How the country responds to the growing cyberthreats will shape its diplomatic, military and economic power. With the stakes this high, is the U.S. getting it right? Chris Painter, commissioner on the Global Commission on the Stability of Cyberspace and former White House cyber czar, offers his perspective.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.