The exponential thrust in digitization has all organizations adopting new technology as the Threat Landscape in India is growing at much faster pace. The recent Ransomware attacks in India has only taught us cybercriminals in 2023 will only be fine tuning their methods.
To curb the rising number of cyber security...
First-party fraud is all about intent and banks have to determine whether the person carrying out the transaction is doing it intentionally. That's hard to do for a basic binary decision model, says Steve Lenderman, senior vice president/director of global loss prevention and fraud, BM Technologies.
Proofpoint has focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. Acquiring Illusive in December will help Proofpoint block identity attack paths when a user is compromised.
The cloud security landscape has long been fragmented, and different vendors attempt to separately address containers, serverless and vulnerabilities, says Wiz CEO Assaf Rappaport. Consolidating detection, vulnerability and misconfiguration data in a single place reduces the noise for clients.
Lacework has debuted an attack path analysis tool to help organizations understand the havoc specific threats could wreak within their cloud infrastructure, says CEO Jay Parikh. The company helps customers prioritize which risk elements inside their infrastructure should be addressed first.
The Identity Theft Resource Center's 2022 Annual Data Breach Report reveals a near-record number of compromises - the second-highest number in 17 years. ITRC COO James Lee worries that a sudden lack of transparency in breach notices is creating more risk for consumers.
Ukraine traced a cyberattack that delayed a press briefing by the nation's information protection agency Tuesday to Russian Sandworm hackers. The group, which is accused of using wiper malware to disrupt the Ukrainian national Media Center, has close ties to the Russian GRU, investigators say.
How does a CISO map his goals to the security investments made by a company long before he came onboard? How can you balance the short-term and long-terms goals at a new organization? Aditya Vardhan, CISO of Jindal Power & Steel, shares his insights on ensuring a smooth transition.
BlueVoyant has strengthened its ability to monitor the remediation of supply chain issues and integrate that with questionnaire activity, CEO Jim Rosenthal says. Existing supply chain tools tend to generate lots of risk information but then put the burden on the client to interact with suppliers.
Identity and access management company Okta revealed that its private GitHub repositories were accessed earlier in the month, resulting in the theft of its source code in its Workforce Identity Cloud code repositories. "No customer data was impacted," Okta says.
The latest edition of the ISMG Security Report discusses why it is always a bad idea for organizations to pay hackers for data deletion, practical steps organizations can and should take to avoid being at the heart of a data subject complaint, and the latest efforts to tackle the ransomware threat.
Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig's Falco open-source threat detection engine to secure their environments. Sysdig CEO Suresh Vasudevan says Falco has become the standard for threat detection in the industry.
This report dives deep into the modern endpoint detection and response (EDR) platform that is driven by artificial intelligence/machine learning for security effectiveness.
Download this report and learn more about:
Advanced automated threat detection and response capabilities, with no need for human...
This report shows how IBM Security ReaQta provides complete endpoint threat coverage of sophisticated cyberattacks with virtually no human intervention while producing top-quality alerts.
Download this report to learn about how ReaQta delivered:
100% detection coverage across the cyber kill chain
No...
What happens when a water management facility –classified as critical infrastructure and essential services– is infiltrated by a foreign threat actor?
This case study dives into an in-depth analysis of the security challenges faced, conditions under which the breach happened, and how the whole situation was...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.