Erika Voss, vice president of information security at DAT Freight & Analytics, discusses the evolving landscape of cybersecurity investment, the critical areas often overlooked by enterprises - including insider threats, and the importance of building a cybersecurity culture within organizations.
Malicious actors can use quantum computing to break encryption algorithms and exploit the trust that users place on legitimate applications and websites, and only post-quantum cryptography can defeat the threat and preserve the sanctity of digital communications, said Amit Sinha, CEO, DigiCert.
Financial institutions must either understand and implement better strategies for detecting and mitigating authorized transfer scams, or risk rising financial losses and customer frustration.
To explore how financial institutions are addressing scam detection and mitigation, we commissioned a survey of over 400...
Money mules are a key enabler of digital banking fraud which impacts consumers and organizations across the globe. They facilitate the movement of fraudulent funds, which can threaten the stability and integrity of organizations at a global level and impact consumers’ trust and willingness to conduct business with...
Healthcare sector organizations often still struggle to implement security frameworks effectively, often not fully understanding the requirements or failing to integrate them into their overall cybersecurity strategy, said Keith Forrester of security firm Optiv, who offers tips to help.
Microsoft announced in December that support for Windows 10 will end when the OS reaches end of life in October 2025, yet enterprise adoption of Windows 11 is moving slowly. Enterprise leaders believe migrating to the new OS will lead to compatibility issues and increase costs to upgrade devices.
Faced with relentless cyberattacks and the shortcomings of existing defenses, Sanaz Yashar embarked on a journey to create a security risk and mitigation platform, transforming frustration into startup Zafran, which emerged from stealth Thursday with more than $30 million in funding.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
Cybersecurity startups are wary of the public markets following a hard economic reset that made profitability more important than growth and performance more important than potential. Due to this dramatic shift, lots of cybersecurity startups want to file for an IPO, but nobody wants to go first.
As quantum computing looms, experts emphasize the urgency of embracing quantum-safe strategies. They highlight the need for proactive measures to protect digital assets from future breaches, deliver long-term data security and ensure the integrity of encryption.
What if the world had access to memory-safe hardware for both IT and operational technology environments that could outright block many types of vulnerabilities from being exploited as well as make code safer to run on legacy systems? Enter the U.K.'s Digital Security by Design initiative.
The U.S. Securities and Exchange Commission (SEC) now mandates public companies to disclose major cybersecurity incidents and outline their cybersecurity risk management annually, starting December 2023. This aims to standardize disclosures, offering investors more consistent information.
Key regulation elements...
The U.S. Cybersecurity and Infrastructure Security Agency apparently had a good reason to urge federal agencies to reset vulnerable Ivanti VPN devices: Hackers breached two gateways used by CISA, forcing the agency to yank them offline. The agency "immediately took offline" the affected VPNs.
The European Parliament and the council of direct European national governments reached a political agreement Tuesday on a proposal that seeks to improve trading bloc cybersecurity. The Cyber Solidary Act will create a "cybersecurity shield" consisting of cross-border security operations centers.
When trying to build Cyber Resilience, an organisation is challenged by an ever-changing cyber threat landscape.
Operating at a fast pace and innovating more, means greater chances of risk and vulnerabilities.
In this webinar, we will delve into how Australian enterprises can proactively manage tech and cyber...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.