Data breach

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

Partner Content
Is Your Data Hackproof?

Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers. 

The top 3 disruptive FinTech technologies to watch in 2018

FinTech will benefit from three technologies that are expected to expand the usefulness of big data, offer more secure and responsive applications and exponentially grow computational performance.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

Rising threat: Children’s identities being sold on the dark web

Michael Connory’s firm Security in Depth develops cyber security awareness programs for corporate organisations. This training involves discovering what information about company executives resides on the ‘dark web'. But these searches often uncover something more sinister.

Partner Content
Using data governance and compliance to your advantage

A proper data governance and compliance policy benefits an organization in more ways than just making them compliant with the latest norms.

Data security is integral to the booming healthcare sector

The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.

4 critical considerations to evaluate and choose your DDoS solution

For a generation that breathes online, one of the biggest threats to watch out for is DDoS attacks. To understand this menace better and choose the right solution for your organization, here we dive into the four critical considerations needed for evaluating DDoS solutions.

Sophisticated attacks go undetected with traditional security solutions: CrowdStrike

Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering. 

GDPR’s breach-reporting mandate can prove to be a challenge: Jaspreet Singh, EY

At IDG Security Day, Jaspreet Singh, Partner – Cyber Security (Africa, India & Middle East) at EY, decodes GDPR and points out areas that could prove to be a challenge.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.