For many organizations, fighting the growing threat of ransomware doesn't necessarily have to mean investing in new technologies, says Robert Arandjelovis of Symantec.
The front line to battle Russian hackers is shifting to American courts, according to the lead story in the latest edition of the ISMG Security Report. Also, malware targets Apple's operating system and a preview of the ISMG Fraud and Breach Prevention Summit in New York.
What are some of the critical action plan for firms post-breach? Sapan Talwar, former IT security leader at Adobe, elaborates on how organizations should collaborate with law enforcement agencies and regulators in the wake of a breach.
Mobile apps in India seeking blanket access to phone users' information have come under the lens of TRAI. Security practitioners believe the data privacy dilemma combined with shortcomings in the privacy laws are resulting in such privacy violations.
Australia's mandatory data breach notification law, which goes into effect next February, brings a host of new requirements. Gordon Hughes, an attorney and data protection expert, discusses what organizations need to be aware of ahead of its implementation.
Police in Greece arrested Russian national Alexander Vinnik, who was indicted by a U.S. federal grand jury for allegedly running the BTC-e bitcoin exchange and helping to launder $4 billion in cryptocurrency tied to criminal enterprises, including the hack of the Mt. Gox bitcoin exchange.
With less than a year to go before enforcement of the EU's General Data Protection Regulation, or GDPR, which applies to any organization that handles Europeans' data, many larger organizations affected in India have yet to make much headway in appointing a data protection officer as required by the law.
True cybersecurity is about looking for what the new threats are and staying on top of those. And when it comes to fraud prevention, staying focused on the cybercriminal and the fraudster is what protects your customers and organisation.
Download this whitepaper and learn about:
The most prevalent fraud types and...
Srinivas Poosarla, Infosys's data privacy chief, discusses the impact of the European Union's General Data Protection Regulation, or GDPR, on Indian companies and the steps that security practitioners need to take to comply.
A discussion on the latest happenings in the darknet marketplace leads the latest edition of the ISMG Security Report. Also, getting to the bottom of Russia's Democratic Party hack could be the ultimate goal of a lawsuit filed against the Donald Trump presidential campaign.
Organizations and analysts need the ability to shift threat intelligence from a data feed into actionable results - this is the core of applied threat intelligence (ATI). Organizations need to move their thinking away from viewing data breaches as a onetime event and instead recognize that with every incident they are...
Banks that cannot evolve their fraud detection capabilities to effectively address two seemingly opposing requirements - building trust through strong cybersecurity programs and delivering a seamless customer experience - will fail to build new market share, and will lose market share to those banks that...
As financial institutions seek to capture new opportunities through online banking, it becomes increasingly critical to both provide a seamless user experience and help protect against online fraud. But fraudsters continue to successfully modify their attack methods to keep pace with this transformation, stealing...
Banks often view innovation as coming at the cost of security. Instead, security can be an enabler to the digital transformation - helping banks welcome customers in and keep fraudulent activity out so they can pursue new growth opportunities, improve the customer experience, and build customer loyalty.
Download...
Ashley Madison wants to put that sordid data breach affair behind it. Parent company Ruby Life has reached an $11.2 million settlement agreement with the plaintiffs behind two dozen U.S. class-action lawsuits - since consolidated - lodged in the wake of its massive 2015 breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.