This year's Black Hat Europe conference in London features dozens of briefings touching on a wide variety of topics, including exploiting contactless payment and Bluetooth vulnerabilities, identifying vulnerable OEM IoT devices at scale and running false-flag cyberattacks.
The unstoppable App economy is obsessed with the User experience. They'll unceasingly recruit your Users & suck more services out of I.T. & into their Clouds. IoT will explode from 7 billion objects today, saturating enterprises with over 21 billion objects in the next five years, stretching the IoT economy from $151B...
According to the 2019 Cyberthreat Defense Report, nearly eight out of 10 organizations were victims of at least one successful cyberattack in 2018.
While corporate strategies around digital transformation are driving measurable business outcomes, they are - at the same time - creating new security risks through the...
Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. India is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS...
How can banks leverage artificial intelligence and machine learning to drive innovation while ensuring that the project is secure and would not make the data vulnerable? How important is it to take a structured approach in implementing "security by design" for conducting proper risk assessments of the organizations...
Complying with regulations and standards, including GDPR, PCI DSS, the RBI Gopala Krishna Committee report and the UIDAI's Aadhaar biometric, has increased the need for stringent data protection measures. India's upcoming data privacy bill will further mandate all organizations to safeguard sensitive data.
Many...
About 50 banks in India have cyber insurance policies to cover breach response costs, risk mitigation services, notification, forensic services, public relations, crisis management and any customer loss which can be quantified, as well as third-party risk exposure and other specialty services, such as hiring an...
Digital transformation to the cloud has resulted in increased dependency on third-party vendors to manage security tasks. This means managing the security risks involved is becoming a bigger challenge. Many organizations still have a long way to go in strengthening governance when it comes to vendor management as they...
India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches and to have better data protection mechanisms in place. The move could help fast-track cybercriminal investigations. But will data localization lead to improved data security or will it result in major...
Organizations that are relatively well-resourced and committed to cybersecurity stand to benefit from cybersecurity audits.
Cybersecurity audits provide an additional layer of assurance that an organization is safeguarding the data that has become increasingly essential in driving and transforming virtually every...
Many high-profile breaches have grabbed headlines this year, including those at Wipro, Toyota and Capital One. What lessons can CISOs learn from this year's big breaches as they develop risk mitigation strategies for 2020?
This session addresses:
Top priorities for CISOs next year;
Important lessons to be learned...
The long-awaited Personal Data Protection Bill is ready to be tabled in Parliament during this winter session. Organizations across geographies are still struggling to understand the nuances of the European Union's General Data Protection Bill and the California Consumer Protection Act.
Indian enterprises are...
Cloud adoption has created challenges for enterprises, including third-party risks, breaches caused by cloud misconfigurations, excessive permissions to access data, lack of effective methods and many more.
Traditional enterprise cloud architectures have paved the way for hybrid enterprise architectures, which have...
The modern digital economy is built on a foundation of trust, which is becoming increasingly more fragile and vulnerable to risks that we are just starting to understand. Digital technologies are a force for progress. Yet, they are also a source of distrust in the very technology that is intended to drive that...
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.