As the IT infrastructure evolves and becomes far more complex, security needs to be built in, not bolted on later, says VIjendra Katiyar of Trend Micro.
The fallout from the 2015 TalkTalk hack continues as a 22-year-old U.K. man was sentenced to jail Monday for his role in the attack and other cybercrimes, including an attack against his former school.
Cybersecurity is a priority for the second term of Prime Minister Narendra Modi. As he completed his cabinet ministry appointments, he instructed the ministers to take up initiatives that can help build a cyber-resilient nation.
Global payment companies Mastercard and Visa say they are making progress toward storing all their data on Indians within the country and wiping out data related to Indian transactions that's stored overseas. The moves are an effort to comply with Reserve Bank of India's directive on data localization.
It's critical for SOC team to extensively leverage Artificial Intelligence to transform its operations and enhance its investigation capabilities in making the organization safe from attackers and achieving the business goals.
Criminal gangs have been hitting e-commerce sites hard lately by injecting their malicious code to "skim" customers' payment card details. In a recent twist, Malwarebytes spotted a malicious iFrame that steps in front of the normal payment process to intercept card details.
At this week's Information Security Media Group Fraud & Breach Summit in Bengaluru, India, national cybersecurity coordinator Lt. Gen. (retired) Rajesh Pant spoke about the challenges facing the country over the coming years.
Keeping organizations safe from attackers and staying one step ahead of them is a tough proposition, and hence identifying threats accurately with integrated user behavioral analytics and artificial intelligence makes tremendous sense as this can save invaluable investigation time.
ScarCruft, a Korean-speaking APT group that has been targeting organizations mainly in Southeast Asia over the past three years, is developing new malware that targets Bluetooth-enabled devices, according to Kaspersky Lab.
Facebook is warning users of its WhatsApp messaging app to update immediately to fix a flaw that is being used to remotely install Pegasus surveillance software from Israel's NSO Group. WhatsApp says a "select number" of targets were hit by the attacks, which it has blamed on "an advanced cyber actor."
Security awareness training helps educate organizations and prepare its people to defend against today's most threatening cyberattacks. But, sometimes well-intentioned strategies can have unintended consequences. Leveraging a "one-size-fits-all" solution may work for maintaining compliance, but what happens when a...
The modern data centre is increasingly a heterogeneous mix of environments and technologies that combine physical servers, virtual machines and containers in on-premises facilities, private clouds and public cloud IaaS providers. Organizations are constantly shifting data and workloads among them as traffic levels and...
To advance at the pace of innovation, your enterprise has to embrace the latest security methodologies without adding unnecessary complexity or risk. Learning micro-segmentation best practices will help you choose the right path for security for your business and allow you to successfully implement a project that will...
With IT environments more complex and dynamic than ever, micro-segmentation is the clear choice for isolating communication flows and hardening your security posture. The right provider should help you accurately visualise and map all of your application flows and dependencies and then enable micro-segmentation...
For the first time, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public appearance to discuss how they collaborate, sharing a stage in Glasgow, Scotland, during the CyberUK conference. The Five Eyes alliance comprises Australia, Canada, New Zealand, the U.K. and U.S.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.