Agility and security do not have to be in conflict, and businesses of all sizes have the capacity to innovate swiftly and operate securely.
Join us for a webinar on how cloud security will bring together leading technologies to provide comprehensive cloud security solutions. Through collaboration, we will discuss...
True end-to-end cloud security involves protecting data and resources throughout the entire cloud environment – from the user's device to the cloud service provider's servers – and back again. A combination of physical, technical, and administrative controls that are designed to safeguard data, applications, and...
In times of economic uncertainty, security teams are tasked to do more, but with fewer resources, making it more difficult to mitigate cyberthreats. The status quo of standard tools & methods make it overly complex and inefficient when it comes to the use of both money and human capital (of which there is a growing...
The European Central Bank will conduct cyber stress tests to determine banks' resilience against cyberattacks. The tests, which will receive a "significant amount of time and resources," are set to be completed by mid-2024, said Andrea Enria, ECB's top official for oversight.
Identity verification and e-signature firm OneSpan is working with investment bank Evercore on a sale process that could attract interest from other businesses and private equity firms, Reuters reported. This follows five publicly traded cyber vendors agreeing to go private since the start of 2022.
Because open source usages is now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Organizations are also keenly aware of the legal risks of failing to comply with the open source licenses that govern the components they use....
The new norm in a post-pandemic world means that organizations have shifted to hybrid / remote work, taking your organization’s crown jewels outside of the network: your data, applications, and users. As a result, traditional perimeter-based tools like network firewalls and VPNs are proving more and more ineffective...
In today's rapidly evolving threat landscape, cyber attacks are becoming more sophisticated, with spear phishing attacks now the most common way for cybercriminals to enter an organization. With the advent of new technologies like ChatGPT and Deepfakes, the situation is only getting worse. ChatGPT is being used to...
According to the World Economic Forum, geopolitical instability has helped to close the perception gap between business and cyber leaders' views on the importance of cyber risk management, and "91% of all respondents" believe that "a far-reaching, catastrophic cyber event" is on the horizon.
Banks must rethink their risk management approach in order to be more cyber resilient, says Simon Onyons, managing director, EMEA, cybersecurity with FTI Consulting. The Financial Service Authority in Indonesia recently issued new cybersecurity requirements for the banking industry in the country.
In this episode of "Cybersecurity Unplugged," Patricia Muoio, a partner at SineWave Ventures, discusses the need for cyber resilience as security leaders face the inevitable stream of cybercrimes, how to achieve it through a zero trust approach, and how CISOs and the government can help.
The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.
Security ratings provide a strong indication of potential risk, but boards increasingly want to drill into the underlying risk factors, says CEO Steve Harvey. BitSight has invested in both workflows around third-party risk and research and identification of CVEs on behalf of government agencies.
Unifying decision-making about privacy, security, ethics and governance poses a huge challenge from a regulatory and operational perspective, says OneTrust CEO Kabir Barday. OneTrust has created a network of 900 lawyers across 300 jurisdictions that feed intelligence into the company's platform.
In the next three years, CISOs face daunting challenges, including rapidly changing threat vectors, new APT attacks and the implementation of new defensive solutions, says Anuprita Daga, chief information security officer and chief data protection officer at Yes Bank.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.