While doing digital transformation, CISOs tend to look more at technology and try to adapt it without making the distinction between technologies that are must-have and good to have. Krishnamurthy Rajesh of ICRA says CISOs must analyze risks, update security, and change the mindset of employees.
Four ISMG editors discuss important cybersecurity issues, including law enforcement authorities' disruption of ransomware gang REvil's operations, how to collaborate as an industry to fight the surge in ransomware attacks hitting businesses, and increasing diversity and inclusion in the workplace.
Effecting a shift around attitudes towards security is a balance between policy, education and moves that encourage good security decisions, says Hilary Walton, CISO with Kordia Group.
For today’s business, security is a teamwide effort and should involve everyone at your organization, not just IT. All it takes is one slightly out-of-date computer or a reused password for a cybercriminal to gain access to your company's most sensitive data.
Is your security risk management handled only by IT?...
Asaf Ahmed, former CISO for Fire and Rescue New South Wales, has had long career in Australia. He built that government agency's information security program. Ahmed shares his ideas on risk, cybersecurity standards and what the future holds.
In his second Rant of the Day for the CyberEdBoard Profiles in Leadershop blog, Ian Keller, security director and CyberEdBoard executive member, talks about what a CISO does - and what a CISO should do.
It's often noted that some view cybersecurity as putting the brakes on business. But it's actually the opposite, says Wouter Veugelen, CISO of Oil Search Ltd. "Cybersecurity provides the guard rails for the business to be able to operate within," he says.
To mark Cybersecurity Awareness Month, the National Cyber Security Alliance and U.K. based behavioral science and data analytics company, CybSafe, have released their Annual Cybersecurity Attitudes and Behaviors Report 2021, which uncovers key trends, behaviors and habits among tech users.
More than two-thirds of survey respondents say they take a balanced approach - business, customers and compliance - investing in fraud prevention technology. So, why do they also report customer friction among their top challenges? BioCatch's Raj Dasgupta analyzes the results of the new Fraud Transformation Survey.
Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
In looking ahead to fraud transformation in 2022, it is good to
review where the conversation about 2021 began: with statistics
about perceptions and reality.
More than just survey results, this report offers expert analysis on
how to balance the competing priorities of business, customer and
compliance needs –...
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the importance of product security, the impact of ransomware on healthcare sector entities during the pandemic and thinking about cybersecurity awareness creatively.
The latest edition of the ISMG Security Report features an analysis of the arrest of two suspects tied to a major ransomware group in Ukraine. Also featured: Introducing "The Ransomware Files" and defining the next-gen CISO.
The 2021 Cybersecurity Complexity Study was conducted in the summer of 2021. Focused on EU & UK enterprises, the survey
received more than 200 responses from organisations primarily in professional services (37%)
and financial services (32%), but also in retail, utilities and manufacturing, mainly with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.