The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.
Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers.
FinTech will benefit from three technologies that are expected to expand the usefulness of big data, offer more secure and responsive applications and exponentially grow computational performance.
Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
Michael Connory’s firm Security in Depth develops cyber security awareness programs for corporate organisations. This training involves discovering what information about company executives resides on the ‘dark web'. But these searches often uncover something more sinister.
The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.
For a generation that breathes online, one of the biggest threats to watch out for is DDoS attacks. To understand this menace better and choose the right solution for your organization, here we dive into the four critical considerations needed for evaluating DDoS solutions.
Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering.
At IDG Security Day, Jaspreet Singh, Partner – Cyber Security (Africa, India & Middle East) at EY, decodes GDPR and points out areas that could prove to be a challenge.