An enterprise today runs hundreds, if not thousands, of applications, many of which harbor vulnerabilities that make them gateways for attack. Web applications, which provide a two-way path for employees to access the outside world and outsiders to access enterprise resources, now account for 31 percent of all...
Most financial institutions used to allow customers to log in to their accounts with a simple username and password. But passwords are notoriously insecure - many users choose weak passwords that can be easily guessed or cracked. In an effort to help strengthen security, large numbers of banks began using a second...
FireEye just released a report called "APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION" .The report focuses on a targeted threat group that we call APT30 (Advanced Persistent Threat group 30) and details how a cyber-threat group exploited Governments and commercial entities across India and...
The Internet as we know it may be heading toward fundamental changes in the coming decade as a result of an intense privacy debate, says Internet pioneer and DNS guru, Dr. Paul Vixie. Find out his predictions.
Governance, risk and compliance efforts have failed to evolve in the Indian marketplace, says Vidya Phalke of MetricStream. He believes most organizations lack a proper framework, and they must build a robust GRC culture.
Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information.
Verizon is out with its annual Data Breach Investigations Report. Which breach and security trends are most relevant to India, and how do security leaders recommend that Indian organizations respond?
Everything from playing cybersecurity offense to the limits of cryptography in the post-Snowden era are on the agenda for this year's RSA Conference. Here's our rundown of must-see events.
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.
(ISC)²'s seventh security workforce study says APAC CISOs opt for outsourcing of security, given technology sprawl, new threats and lack of in-house skills. Regional experts respond to these findings.
With India facing a major staffing deficit in cybersecurity, the National Security Database is redoubling its efforts to organize a credible workforce. Director Rajshekhar Murthy shares these initiatives.
Leaders and top practitioners from numerous federal government agencies will transplant themselves to San Francisco this coming week to share their knowledge on a wide range of topics at RSA Conference 2015.
Collaboration is a critical investment for many organizations looking to drive competitive advantage by better arming knowledge workers with information, access to expertise, and the ability to act collectively on trusted content. Forrester data shows that over 50% of organizations have implemented or are expanding...
The dynamics of the world economy and the demands on governments at all levels put increasing pressure on organizations to reduce costs while seeking new opportunities to grow and differentiate their products and services. The pervasiveness of the Internet and mobile devices is fostering multi-channel customer...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.