In the latest weekly update, five key cybersecurity influencers join editors at Information Security Media Group to share predictions, themes and trends ahead of RSA Conference 2023, including a preview of speakers and interviews and an overview of ISMG's coverage at the event.
Italy's suspension of ChatGPT is part of a "wider campaign in Italy" to regulate the use of AI applications, said attorney Jonathan Armstrong of Cordery Compliance, who added that transparency, usage and the protection of intellectual property are major concerns with the new generative AI tool.
While most organizations carry out risk assessments and cybersecurity audits, security practitioners need to go beyond these manual processes to ensure proper protection, says Angel Redoble, group CISO, PLDT Group. He recommends starting with identifying all of the potential attack entry points.
The onslaught of distributed denial-of-service, ransomware, data exfiltration and other attacks on the healthcare sector highlight the importance of optimizing the many sources of threat intelligence available today, says Taylor Lehmann, director of the office of the CISO at Google Cloud.
Regulators are scrutinizing the use of website tracking codes and analytics such as Meta Pixel and Google Analytics. Health entities must carefully assess how those tools are being used on their health-related websites, say privacy attorneys Cory Brennan of Taft and Mark Swearingen of Hall Render.
In the latest weekly update, Venable's Jeremy Grant joins ISMG editors to discuss how to defend against the increasing use of MFA fatigue attacks, takeaways from a recent U.S. probe into compliance issues related to Login.gov services and the latest updates on the Improving Digital Identity Act.
IAM has always been a manual process. While many organizations try to automate IAM, it is not easy. Pooja Agrawalla, head of IAM at NXP Semiconductors and winner of ISMG's Dynamic CISO Excellence Award for Women Leaders in Cybersecurity, discusses best practices for IAM deployment and automation.
Supply chain attacks have evolved from exploiting organizations with unpatched vulnerabilities in open-source libraries to proactively injecting malicious code into a victim's IT environment, according to Janet Worthington, senior analyst at Forrester.
More threat actors are dedicated to attacking industrial organizations, and that increasing volume and sophistication of attacks has left organizations clamoring for suppliers with expertise in safeguarding OT infrastructure, said Rockwell Automation's Mark Cristiano.
The Philippines plans to introduce a national cybersecurity plan later this year. What expectations do security practitioners have, and what changes would they like to see? Joey Fontiveros of the Philippine Army Signal Regiment shares his views on the plan and its impact on cloud security.
India is leading the digital payments revolution on the world stage with its widely accepted unified payments interface. N. Rajendran, the chief digital officer of the Multi Commodity Exchange of India, who has worked on UPI since its inception, discusses its successful implementation.
Cyber insurance is just one piece of the puzzle to address rising cybersecurity issues. Cyber insurance is not a defense strategy but more of a risk transfer strategy that can save your skin if there is an incident, said Deepika Mathur, CEO of Markel India.
The hyperconvergence of the communication and computing technology of 5G and edge cloud to offer virtualized services to customers in the form of a "bank in a box" will redefine the way banks will operate in the future, said the Reserve Bank of India’s D. Janakiram.
The proposed Personal Data Protection and Privacy Bill, which was tabled in the Indian Parliament, needs to guarantee the fundamental right of privacy and have a methodology to establish a secure data flow across the border, under Section 17 of the IT Act, said retired Justice B.N. Srikrishna.
Indian national cybersecurity coordinator and retired Lt. Gen. Rajesh Pant says Indian enterprises need to start investing in cybersecurity to respond to increasing cyberattacks since cyberspace is now borderless and interconnected with little attribution.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.