Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.
This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
Blockchain, the digital ledger used for cryptocurrency, can serve as an effective identity management platform, asserts Chris Boscolo, CEO of ZNO Labs, who describes an approach he calls "self-sovereign identity."
"We are living in difficult times ... when the government data is the most vulnerable," says Jayesh Ranjan, principal secretary-IT, electronics and communications & industries and commerce, government of Telangana. He calls for creating "a strong institutional mechanism" to tackle threats.
Hospitals need to improve their efforts to update the software in their medical devices to minimize vulnerability to malware, says Minatee Mishra, lead engineer, security center of excellence, at Philips Health Tech, India.
In the wake of news that 12 additional Russians have been indicted for conspiring to interfere with the 2016 presidential election, a key question emerges: What will President Trump say when he meets Monday with Russian President Vladimir Putin? Carbon Black's Tom Kellermann offers analysis.
The latest edition of the ISMG Security Report features a discussion of California's groundbreaking new privacy law as well as an update on the potential impact of the hacker group responsible for the Ticketmaster breach.
Implementing a next-generation cybersecurity operations center, or CSOC, enables CISOs to take a modular approach to improving risk mitigation, says M. Srinivas Rao, co-founder and CEO at Aujas Networks, a global IT risk management company.
With the increase in vulnerabilities in operational technology infrastructure, it's important to deploy unidirectional hardware gateways to restrict entry into OT networks, says Ajit Jha of L&T Technology Services.
Organizations in India must strive to quickly comply with the EU's GDPR, which is becoming a global standard, and also draft its own national privacy regulations, says Sanjay Sahay, additional director general, cyber, Karnataka Police.
A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his perspective on converting standards to practices.
Leading the latest edition of the ISMG Security Report: CipherTrace CEO Dave Jevans discusses recent research on cryptocurrency money laundering and whether regulation is possible. Plus, California passes a new privacy law.
Cryptocurrency money laundering is increasing dramatically, being already three times greater than in 2017. And we're only half way through the year, observes Dave Jevans, Founder and CEO of CipherTrace, and chairman of the Anti-Phishing Working Group.