Today's "deepfake" technology makes the voice channel a nascent avenue for fraud. Mark Horne of Pindrop describes new threats to interactive voice recognition channels.
As consumers and organizations demand more stringent identity and access management controls, self-sovereign identity management can play a critical role, says Heather Dahl of the Sovrin Foundation.
New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions.
As cloud-first and cloud-native become more common labels in the industry, organizations are focusing on achieving visibility and operational excellence, says Trend Micro's Wendy Moore.
Among the many cybersecurity and privacy risks involving the fast evolving global coronavirus outbreak are potential concerns related to the technology assessments during trial or vaccine research, says cyber risk management in global digital health expert Stanley Mierzwa of Kean University in Union, New Jersey.
The California Consumer Privacy Act, the EU's General Data Protection Regulation and other privacy laws are focused on making enterprises and boards of directors more accountable, says Marc Cohen of ePlus Technology, who discusses compliance issues.
Harvard Kennedy School Professor Juliette Kayyem - well known as a CNN cybersecurity analyst - spoke at RSA 2020 and visited ISMG's studios to share insights on nation-state threats and election security.
Targeted ransomware attacks continue to increase as gangs seek to obtain bigger ransom payoffs by hitting larger targets, aided by a cybercrime services economy that provides access to tools and tactics that were previously the domain of APT groups, security experts warn.
For maximum effectiveness, security-as-a-service solutions can no longer simply be reactive, but must instead be predictive, says Mat Gyde, CEO Security Division, NTT Ltd., and Palo Alto Network's Karl Soderlund, as they describe their companies' new partnership.
Many organizations have leapfrogged from "cloud concerns" to "cloud first" mindsets. What are the implications for encryption and access control in a multi-cloud environment? Lee Waskevich of ePlus and Todd Moore of Thales discuss the challenges and solutions.
There is no more fundamental element in cybersecurity than identity. And in some ways, there's nothing harder to secure. Bil Harmer of SecureAuth calls identity "the last bastion" of cybersecurity, and he's eager to take it on in his new role.
Office365 and SaaS usage are driving a shift away from managing security on premises, necessitating stronger security in the cloud, says Kowsik Guruswamy, CTO at Menlo Security.
Ransomware has evolved in two alarming paths: One to create distraction, the other to ensure destruction. Microsoft's Diana Kelley describes the new trends and how enterprises can respond.
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.