Organizations looking to migrate to a next-generation security operations center must first carefully assess any problems they are facing with current security technology, says Vikram Mehta, associate director of information security at MakeMyTrip, an India-based online ticketing portal.
Where is the greatest potential for the implementation of blockchain in healthcare? Attorney Steven Teppler discusses the possibilities for the distributed ledger technology as well as its security pros and cons.
In this edition of the ISMG Security Report, former federal CISO Gregory Touhill explains why a zero-trust security model is essential, and Ron Ross of NIST describes initiatives to protect critical infrastructure from IoT vulnerabilities.
With an operating system that's used by 90 percent of Fortune 500 companies, Microsoft closely monitors cyberattack trends. Joram Borenstein, general manager of Microsoft's Cybersecurity Solutions Group, discusses his top three concerns for 2019.
Fraud detection requires an omnichannel approach to behavioral analysis that involves monitoring users' access to networks via the web, mobile, a call center or other channels, says Shai Cohen, a vice president at RSA.
"Self-sovereign identity" projects based on blockchain technology are likely to gain significant momentum in 2019, says analyst Avivah Litan of Gartner Research.
One of the many concerns with the draft data protection bill is the lack of power granted to the data protection authority, says Prasanth Sugathan, legal director at Software Freedom Law Center, a non-profit organisation based in New Delhi that promotes innovation and open access to knowledge.
Mastercard has launched a "fusion center" designed to increase its speed of response and coordination among departments in the event of a cyberattack, says CSO Ron Green, who explains the initiative.
Leading the latest edition of the ISMG Security Report: Microsoft's Joram Borenstein highlights his top three areas of focus for 2019. Plus, Randy Vanderhoof of the US Payments Forum on securing card transactions in the coming year.
Managed security services providers are playing an important role in helping organizations cope with hiring challenges and meet regulatory compliance requirements, says Kartik Shahani, director of channels for APJ at RSA.
Efforts to protect privacy must be carefully balanced against the need to practically implement advanced technologies, argues Jared Ragland, senior director for policy in APAC at BSA/The Software Alliance, an advocacy group for software companies.
Hardware authentication and user behavior analytics are among top promising security technologies that Michael Prakhye, CISO at Adventist HealthCare, will closely examine in the year ahead.
Aite Group's Shirley Inscoe predicts that more banks will implement robotic process automation in 2019 to make fraud investigations more efficient. She explains how the technology can help.
Security operations centers are the hub for an organization's threat detection. But organizations can take a number of steps to improve SOC operations, says Kerry Matre of Palo Alto Networks.
Account takeover is a rapidly growing arena for cybercriminals. How can organizations strengthen both authentication and authorization? Scott Olson of iovation, a TransUnion Company shares his insights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.