Security

Back to Topic page

Cos Need to Embed Cyber Security into Their Products and services, Supply Chains and Partnerships: CISO, Indiabulls

Rohit Kachroo, CISO, Indiabulls Group, in conversation with dynamicCIO gives an insight into what is it that’s keeping the CISOs awake at night and how they need to transform themselves to stay relevant in today’s dynamically evolving threat landscape. Q. What is your vision as a CISO? In general, ...

Identifying Business Context Around Security Incidents is Key to Solve Big Problems: Zulfikar Ramzan, RSA

Is Cybersecurity a technology issue or a business issue? How are Boards reacting to the massive data breaches that are demolishing corporates both financially and reputation-wise? What should a CISO do to manage the deluge of data and devices, half of which are not even visible to him? What’s ...

Vendors Betting Big on Machine Learning in Cybersecurity: Can it Deliver?

Amazon Web Services recently launched its security service called Macie which uses machine learning to automate the process of identifying, classifying and protecting data in AWs. It uses the context of the information to understand what’s sensitive and how. Thus, it recognizes sensitive data such as personally identifiable information ...

Cos Have to Reward and Incentivize Risk Management to Build a Risk Culture

David Walter, Vice President, RSA Archer, RSA in conversation with dynamicCIO decodes risk management.   Q. Considering the digital transformation that organizations are undergoing and adoption of new age digital technologies, what are some of the pertinent risks organizations need to own up?   There are three different risk ...

Is Artificial Intelligence the Future of Cyber Security?

Microsoft on its Blog, a couple of days ago, announced to launch a cloud service that uses Artificial Intelligence to track down bugs in software. The company will soon start offering a preview version of the tool for Linux users as well.                               Microsoft Security Risk Detection, previously known as Project ...

Three Lines of Defense Against Ransomware Attacks by Cybercriminals

Criminals go where the money is, and cybercriminals are no exception.   And right now, the money is in ransomware.   It's a simple scam. Encrypt the victim's hard drive, then extract a fee to decrypt it. The scammers can't charge too much, because they want the victim to ...

Lost Passwords Can Be Changed, But Lost Biometric Identity?

Everyone hates passwords but uses them as a necessity to protect corporate digital assets, personal information, and financial assets. Complexity level has increased with time and so has the ability to crack them. This resulted in multi-factor authentication with various means, the most popular being OTP (One Time Password) ...

Cloud Storage Providers Will Overtake FSI Companies as the Prime Targets of Phishing Attacks in 2017

Yesterday while delivering his keynote at RSA Conference 2017, Brad Smith, President and Chief of Legal Microsoft very aptly pointed towards a very typical syndrome we all humans suffer from: Inquisitiveness. "90% of intrusions begin with a phishing email and every company has at least one employee who will click ...

Lethal Threats: Will Our Cyber Defence be Any Match?

Not many years ago who could imagine there will be something known as drone – a flying object that could be used to deliver pizzas and packets, flying over weddings venues capturing astonishing visuals, and at the same time also do reconnaissance of a very different kind for keeping ...

CISOs Should Make it Convenient and Compelling for End Users to Comply with Security Policies

Dave Taku, Director Product Management, Identity & Access Management, RSA in conversation with dynamicCIO gives suggestions on how organizations go about dealing with Shadow IT from an information security perspective. Q. In your conversations with CISOs what challenges have they been talking about? In my many conversations with customers ...

Security’s Visibility in the Board Has Gone Up Dramatically in Last Two Years: RSA CTO

Zulfikar Ramzan, CTO, RSA Security in conversation with dynamicCIO.com enlists the top three mistakes he sees the CISOs making and delves deeper on the growing proximity of the CISO to the board. Q. What are the top three mistakes CISOs should be avoiding? The top mistake CISOs make ...

Security Analytics Facilitates a Risk-based Approach to Security

As organizations realize that the threats to their valuable data assets are increasing despite more security tools in their environment, the focus in the industry is shifting to a response-based, risk-led approach. In this backdrop, security analytics is gaining considerable traction. Ryan Stolte, Co-Founder and CTO at Bay Dynamics, ...

Infosec Execs are Dealing with Human Ingenuity, which is Powerful

Amit Yoran, President, RSA set the tone for the three-day RSA Conference 2016 APJ in Singapore with his opening keynote. He spoke around perspectives, and how there is a need to change perspectives to change the results.   Yoran urged the cybersecurity professionals to bring about a change in ...

Behavioral Analytics Key to Tackling Insider Threats

Security vendor Forcepoint, earlier known as Raytheon | Websense, recently launched a new solution that takes the “inside-out” approach to detecting threats rather than the “outside-in” view where most organizations (over 80%) have traditionally focused their efforts. For an effective overall strategy, of course, a balance approach to both ...

The CEO Wants You to Wire Funds Immediately – Aye Aye Sir!!

SPAM emails have always been a problem for businesses around the world; the menace of mass SPAM emails of early 2000s was controlled with evolution of technology and matured SPAM filtering solutions. But guess what, the spammers have also evolved and have figured out a way to extort money ...