A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.
The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.
Google has announced another Google+ data breach, this time affecting more than 50 million users. So here's how to shut down your profile for good.
The top three reasons for fraud were identified as lack of an efficient internal control, diminishing ethical values, and senior management override of controls.
McAfee researchers expect malware-as-a-service families to strengthen, energizing the market for attack outsourcing and the evolution of increasingly innovative and agile attack methods.
The Australian Federal Government has announced the pilot of its digital identity system, myGovID, which is the digital equivalent of a 100-point ID check.
Amidst the widespread furore and the general perception of RBI’s data localisation mandate being a spoke in the wheel for digital payment companies, the latter believes RBI’s diktat is a step in the right direction.