The information provided in a domain name system is far deeper than just those transactions that take place. A DNS provides much more granular information around some security risks, although CISOs tend to overlook this information, says Stuart Reed of Nominet.
PSD2 requirements for strong authentication and third-party bank account access go into effect this September. Angie White, product marketing manager at iovation, discusses the implications of the directive inside and outside the European Economic Area.
Business perimeters are becoming far more difficult to secure in the age of multicloud. Laurence Pitt of Juniper Networks discusses security strategies for the new era.
NTT Security has signed a definitive agreement to acquire WhiteHat Security. NTT Security's Khiro Mishra and WhiteHat Security's Craig Hinkley say the deal will help bring more application security - and DevSecOps - products, services and smarts to more organizations.
New studies debut every day in the cybersecurity field. But how does one separate true research from marketing hype? Researchers Wade Baker and Jared Ettinger discuss the distinguishing qualities of credible studies.
As fraud has shifted over the past decade from basic account takeover to synthetic identities and new account fraud, so has the field of identity protection evolved. Tom Thimot and George Tubin of Socure say they are here to disrupt the industry.
Beazley Breach Response Services, a unit of global insurance company Beazley, reports that nearly half of the more than 3,300 breaches it investigated last year traced to a hack attack or malware infection. And half of those hacking/malware attacks were tied to business email compromise schemes.
An Australian computer security researcher will be sentenced May 1 after pleading guilty to several charges related to an unauthorized intrusion into the network of GoGet, a vehicle sharing service.
A sophisticated attack campaign dubbed "Operation ShadowHammer" involved an advanced persistent threat group planting backdoors within Asus computers by subverting the Taiwan-based PC maker's third-party supply chain and updater software, Kaspersky Lab warns.
Infosys is looking at DevSecOps as an organization change management requirement, and it needs to be driven as a movement, says Vishal Salvi, CISO at Infosys.
Too many basic cyber threats are successful too often. And Korn Ferry CISO Michael Miora says it's because enterprises do too little to understand, record and respond to the most common forms of intrusion.
Late in 2018, Broadcom completed its acquisition of CA Technologies. What is the vision of this new cybersecurity products and services enterprise? Clayton Donley, general manager of security at Broadcom, shares insights.
Web application firewalls usually have not been a part of the DevSecOps conversation, but that's changing, says Andrew Peterson, CEO of Signal Sciences.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.