Security teams must explain to business leaders how customer identity and access management can help with customer retention, says cybercrime and fraud expert Lenny Gusel.
Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce. Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge.
Networks are fundamentally changing as a result of data being used across cloud environments. So security must be built into networks to improve mitigation of cyberthreats, says Nick Savvides, senior director of strategic business, APAC, at Forcepoint.
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
Last week, fraudsters targeted two cryptocurrency platforms by accessing domains managed by GoDaddy, according to notices published by the victimized firms. The domain register company previously has had issues with unauthorized access.
COVID-19 has accelerated the shift to digital banking. Now financial organizations must balance robust fraud prevention with a frictionless user experience, says Mike Slaugh, executive director of financial crimes management at USAA.
An IAM strategy for remote workforces should ensure that key stakeholders are aligned in listing key applications, infrastructure is mapped and risk- and role-based authentication for measuring user risk profiles are applied, says UAE-based Mustapha Huneyd, director of customer security at Ericsson.
Payments companies must secure their APIs and enhance their authentication standards in line with The Reserve Bank of India's guidelines to make QR codes interoperable and boost the electronic payments ecosystem.
While each organization's cloud journey is unique, it is best practice to enforce and maintain consistent, enterprise-wide privileged access management policies.
Included are four use cases that highlight best practices in securing privileged access for your infrastructure and applications in the cloud.
Secure the...
Contextual authentication plays an important role in enhancing security for the remote workforce, says Ajay Biyani, managing director, ASEAN at ForgeRock. But he stresses the need for a frictionless experience.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.