54 percent of survey respondents say their institutions' digital authentication measures are average or below when compared to their peers. And 55 percent rate themselves at average or below when it comes to their institution's current ability to apply the right amount of security to the right transactions at the...
Identity and access management is more complicated when organizations rely on a cloud infrastructure, says Brandon Swafford, CISO at Waterbury, Connecticut-based Webster Bank, who describes the challenges in an interview.
Currently, nearly ninety percent of organizations worldwide are using
Active Directory (AD) for on-premises
resources (aka on-prem). That
represents 500 million organizations
and somewhere around 10 billion daily
authentications. In fact, in the world
of identity and access management
(IAM), AD has become...
French cybersecurity researcher Baptiste Robert, who goes by the name Elliot Alderson on Twitter, has once again exposed an apparent Aadhaar leak. The latest leak, which occurred on state-owned gas company Indane's website, exposed data of as many as 6.7 million customers, the researcher claims.
The number of cyberattacks on financial institutions (FIs) cannot be overstated. In the past year, there have been more than one billion cyberattacks on financial institutions. That is three hundred times more than any other industry, such as retail, insurance, or healthcare. At an average cost of $18 million dollars...
As part of its ongoing push toward cashless payments, India is taking steps to ramp up the use of contactless payments, which are already becoming more common in Japan, South Korea, Australia, the U.K. and the U.S. What can be done to balance security vs. convenience?
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
Despite increased use of two-factor authentication and biometrics, passwords are still the most common form of authentication. However, when most breaches are caused by weak, stolen, or reused passwords, it's clear passwords pose significant risks that can't be ignored.
From potential security breaches to increased...
Although the Reserve Bank of India mandated that banks complete the shift from magnetic stripe debit and credit cards to EMV chip-and-PIN cards by Jan. 1 to help reduce fraud, there's still plenty of work to be done.
German police arrested a 20-year-old student - living at home with his parents - who they say confessed to leaking contact details and sensitive information for an estimated 1,000 German celebrities, journalists and politicians, including Chancellor Angela Merkel.
Leading the latest edition of the ISMG Security Report: Microsoft's Joram Borenstein highlights his top three areas of focus for 2019. Plus, Randy Vanderhoof of the US Payments Forum on securing card transactions in the coming year.
With the Cosmos bank attack still fresh in memory, some security experts are urging the Reserve Bank of India to take immediate steps to upgrade the security capabilities of banks. For example, they want banks to do away with user-based one-time passwords delivered via text messages.
The latest version of the NIST Cybersecurity Framework - Version 1.1 - includes more information on supply chain risk management, authentication, authorization, identity proofing and self-assessing cybersecurity risk management, says Matthew Barrett of the National Institute of Standards and Technology.
In an interview, Rohas Nagpal, a chief architect at Primechain Technologies, describes how blockchain can be used for authentication and pinpoints areas where blockchain is not the ideal technology. He'll be a featured speaker at ISMG's Security Summit in Mumbai Thursday.