Security

Back to Topic page

Is Artificial Intelligence the Future of Cyber Security?

Microsoft on its Blog, a couple of days ago, announced to launch a cloud service that uses Artificial Intelligence to track down bugs in software. The company will soon start offering a preview version of the tool for Linux users as well.                               Microsoft Security Risk Detection, previously known as Project ...

Three Lines of Defense Against Ransomware Attacks by Cybercriminals

Criminals go where the money is, and cybercriminals are no exception.   And right now, the money is in ransomware.   It's a simple scam. Encrypt the victim's hard drive, then extract a fee to decrypt it. The scammers can't charge too much, because they want the victim to ...

Lost Passwords Can Be Changed, But Lost Biometric Identity?

Everyone hates passwords but uses them as a necessity to protect corporate digital assets, personal information, and financial assets. Complexity level has increased with time and so has the ability to crack them. This resulted in multi-factor authentication with various means, the most popular being OTP (One Time Password) ...

Cloud Storage Providers Will Overtake FSI Companies as the Prime Targets of Phishing Attacks in 2017

Yesterday while delivering his keynote at RSA Conference 2017, Brad Smith, President and Chief of Legal Microsoft very aptly pointed towards a very typical syndrome we all humans suffer from: Inquisitiveness. "90% of intrusions begin with a phishing email and every company has at least one employee who will click ...

Lethal Threats: Will Our Cyber Defence be Any Match?

Not many years ago who could imagine there will be something known as drone – a flying object that could be used to deliver pizzas and packets, flying over weddings venues capturing astonishing visuals, and at the same time also do reconnaissance of a very different kind for keeping ...

CISOs Should Make it Convenient and Compelling for End Users to Comply with Security Policies

Dave Taku, Director Product Management, Identity & Access Management, RSA in conversation with dynamicCIO gives suggestions on how organizations go about dealing with Shadow IT from an information security perspective. Q. In your conversations with CISOs what challenges have they been talking about? In my many conversations with customers ...

Security’s Visibility in the Board Has Gone Up Dramatically in Last Two Years: RSA CTO

Zulfikar Ramzan, CTO, RSA Security in conversation with dynamicCIO.com enlists the top three mistakes he sees the CISOs making and delves deeper on the growing proximity of the CISO to the board. Q. What are the top three mistakes CISOs should be avoiding? The top mistake CISOs make ...

Security Analytics Facilitates a Risk-based Approach to Security

As organizations realize that the threats to their valuable data assets are increasing despite more security tools in their environment, the focus in the industry is shifting to a response-based, risk-led approach. In this backdrop, security analytics is gaining considerable traction. Ryan Stolte, Co-Founder and CTO at Bay Dynamics, ...

Infosec Execs are Dealing with Human Ingenuity, which is Powerful

Amit Yoran, President, RSA set the tone for the three-day RSA Conference 2016 APJ in Singapore with his opening keynote. He spoke around perspectives, and how there is a need to change perspectives to change the results.   Yoran urged the cybersecurity professionals to bring about a change in ...

Behavioral Analytics Key to Tackling Insider Threats

Security vendor Forcepoint, earlier known as Raytheon | Websense, recently launched a new solution that takes the “inside-out” approach to detecting threats rather than the “outside-in” view where most organizations (over 80%) have traditionally focused their efforts. For an effective overall strategy, of course, a balance approach to both ...

The CEO Wants You to Wire Funds Immediately – Aye Aye Sir!!

SPAM emails have always been a problem for businesses around the world; the menace of mass SPAM emails of early 2000s was controlled with evolution of technology and matured SPAM filtering solutions. But guess what, the spammers have also evolved and have figured out a way to extort money ...

Follow the Three-Pillar Concept in Cybersecurity

If 2014 was known as the “year of the breach,” 2015 was the “year of collateral damages,” says the Cyber Risk Report published by HPE earlier this month.  Numerous attacks affected people who never dreamed they might be involved in—or identifiable from—a security breach. There has been a ...

IoT Security Threat Scenarios Impacting Business

Internet of Things (IoT) and business are increasingly being spoken in the same breath. Today there are enough use case scenarios with a business angle and more are emerging. A recent post by dynamicCIO.com outlines 10 Interesting Business Use Cases of IoT Solutions. While these are examples showcasing ...

Cyber Insurance Gaining Momentum as Infosec Becomes an Enterprise Issue

With growing maturity companies are increasingly recognizing IT security has been elevated to being an enterprise issue rather than just a technology issue. Today when cyber attacks happen the repercussions are no longer limited to technology itself. Sachin Jain, CIO and CISO, Evalueserve draws attention to the fact that ...

Enterprises are Battling the Limitations of Appliance Based Security

The security challenge for enterprises is growing more complex each day. As cloud, mobility, IoT and other trends gain ground, the threats are only going to increase. Will throwing more appliances at them solve the puzzle? The answer is no, according to Scott Robertson, Vice President, Asia Pacific and Japan, ...