Collaboration and information sharing among stakeholders - and influencing them to take a proactive approach to cybersecurity - are critical steps in fighting against cyberthreats, says Narendra Mainali, CISO of NIC Asia Bank of Nepal.
Building business resilience through a "zero trust" approach requires role-based authentication, user access velocity checks, and monitoring people, processes, and technologies, a panel of experts says.
As you adopt cloud IaaS to meet business goals, effective security controls can’t be an afterthought. This elastic server environment requires smart access controls; but how do you adhere to your security policies without limiting automation?
Read the five key takeaways from a webinar featuring Dr. Chase...
As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.
In this whitepaper, we cover Okta ThreatInsight, a baseline security feature of the Okta Identity Cloud which helps organizations secure their organization...
Being the CISO of a pharma sector means you are accountable for the decisions made, ensure that you make the best use of the funds, resources and skills, and are capable of translating business requirements into cyber solutions, says Agnidipta Sarkar, group CISO at Biocon, as he takes up the new role.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
Banks in Bangladesh must ensure having a proper data repository and understanding the data flow to establish privacy in a data-driven economy, says Sakil Mahmud, AVP, information security, risk, and compliance at Trust Bank.
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. Whether you’re handling transactional or personal data, it’s critical that it is gathered ethically, managed with integrity, and properly safeguarded. When people are the perimeter, identity becomes the foundation of a Zero...
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
As a retired Air Force general and the former federal CISO of the United States, Gregory Touhill is well-versed in critical infrastructure protection and resiliency. Now, as the new director of CMU SEI's CERT division, he has the opportunity to help foster new levels of education and collaboration.