With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated validation of controls, says Cymulate's Tim Ager.
Cybersecurity is a priority for the second term of Prime Minister Narendra Modi. As he completed his cabinet ministry appointments, he instructed the ministers to take up initiatives that can help build a cyber-resilient nation.
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
In an exclusive video interview, India's cybersecurity coordinator, Lt. Gen. (Retired) Dr. Rajesh Pant, spells out his priorities, including creating of a new national cybersecurity policy.
Businesses need to move beyond security certifications and conduct breach simulation exercises for employees to ensure they're well-prepared, says Rakesh Kharwal of Cyberbit.
Many corporate boards of directors in India have made progress in recognizing cybersecurity as a priority. But clearly, they still have a lot of work to do. Panelists at a recent ISMG summit in Bengaluru offer insights.
Enterprises are increasing their security budgets, but they still are struggling with attracting and training the necessary cyber talent. Organizations are addressing the skills gap challenges using industry certifications, product certifications, on-the-job training or by following cybersecurity frameworks. But these...
Security awareness training helps educate organizations and prepare its people to defend against today's most threatening cyberattacks. But, sometimes well-intentioned strategies can have unintended consequences. Leveraging a "one-size-fits-all" solution may work for maintaining compliance, but what happens when a...
The bad guys are getting very creative, impersonating an executive in your organization and asking for financial reports or they ask employees in payroll to make changes to bank accounts. According to the FBI, their efforts have earned them an estimated $12 billion through Business Email Compromise also know as CEO...
Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.
The exits of the Department of Homeland Security secretary and Secret Service director are prompting discussion about the continuity of U.S. cybersecurity policy because the agencies play a key role in securing infrastructure and investigating financial cybercrime.
Faced with the increasing sophistication and maturity of cyber threats, CISOs and security teams need to devise ways to better cope with the high-stress environment, says Webroot's Gary Hayslip,
India is gradually entering into the league of those nations where critical infrastructure is controlled by the cyber architecture and therefore, naturally becoming an attractive target for the enemies of the state and countries, says S N Pradhan, director general of NDRF, Ministry of Home Affairs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.