Hear ISMG editors untangle the various elements in the Shadow Brokers-Equation Group saga, evaluate a new anti-ransomware tool and reflect on the 10th anniversary of the PCI Security Standards Council in this edition of the ISMG Security Report.
It's easy to look at the payments landscape and see only the flaws. But payment card security has come a long way in the past 10 years, thanks in large part to the PCI Data Security Standard. How will card security be refined in the coming decade?
The UAE has amended its federal law against using fraudulent VPNs. Anyone using one will be fined and possibly imprisoned. Security leaders welcome the move, saying it is a positive step to help combat cybercrime.
CISOs in India will not be able to develop mature information security programs until they address the formidable challenge of gaining the support of senior management, says Manoj Sarangi, vice president and CISO at HCL Technologies, an IT services company.
After any significant breach, many parties - ranging from customers, clients, business partners and government agencies - will demand clarity as to how and what data was stolen.
The Federal Trade Commission, for example, acts to ensure that any given organization is not negligent or reckless with private...
CREST is launching a chapter in Singapore - its first chapter in Asia - to offer information security professionals certification and accreditation in penetration testing. It plans to eventually offer other certifications as well.
As more women make forays into the business landscape in the Middle East, some are beginning to build careers in IT and information security. But it's still by no means easy for women to break into security careers in the region, says Abeer Khedr, director of information security at National Bank of Egypt.
CISOs face the continuing challenge of how to clearly communicate information security risk to the board and senior management. But now they can take advantage of a free metrics framework designed to help evaluate an organization's cybersecurity readiness. Phil Cracknell of ClubCISO describes the effort.
"Inertia and clumsiness" at the Federal Reserve Bank of New York nearly led to one of the biggest cyber-heists in history - resulting in $81 million being stolen from the central bank of Bangladesh - being even worse, according to a new report.
MacKeeper squared off with a 14-year-old over four videos he posted that criticized the anti-virus firm's marketing practices, warning the teenager that his parents could face steep legal fees and civil fines for alleged slander and libel.
France's data protection watchdog has slammed Microsoft Windows 10 for collecting excessive amounts of personal data and failing to use strong security controls. Under the country's data protection laws, Microsoft may now face up to $1.7 million in fines.
The 2016 RSA Conference Asia Pacific & Japan, to be held July 20-22 in Singapore, will offer a security road map, imparting lessons to practitioners to help them navigate through cybersecurity complexities. Here's a preview of some of the top session.
7-Eleven has long been an innovator in retail information systems. Their challenges were they needed secure and reliable network to make it easier for store managers to stock fresh foods and order merchandise to keep pace with ever changing customer preferences. They chose Juniper Networks to overcome these...
The $900 million hospital is designed to offer the latest innovations in medical care, expanded trauma care, enhanced clinical programs, and advanced research directly affecting children.
Lurie Children's uses the latest in electronic health records (EHR), high-definition picture archiving and communications...
Outsourcery is a UK-based cloud services provider offering IT and business communications solutions. As Outsourcery continued to increase the number of cloud services to the public sector, data sovereignty was an essential part of its data security requirements.
Outsourcery needed a new secure network platform...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.