India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
It's still early days for mobile e-commerce in India, but with the quantum of users increasing exponentially, HDFC Bank's new mobile payments platform may be the direction in which the industry is headed.
There is no stopping innovation and technology adoption - especially in developing markets. Experts from Blue Coat Systems tell how enterprises can understand risks and ensure security along the way.
Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, with remote access and third-party risks the key focus - particularly for smaller merchants.
Gartner's John Girard boils down the mobile security challenge to three topics: the number of devices, diversity of capabilities and the complexity of management. How does he advise CISOs to tackle these challenges?
What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session we'll see exactly how rogue apps, malware and...
The emergence of the EMV chip in the U.S. is soon going to change the payments game for issuers and merchants. Here, Sophos' Chet Wisniewski describes what bankers should be doing now to prepare.
As the U.S. embarks upon its migration to EMV, fraudsters will begin testing other vulnerabilities and channels to exploit. As EMV alone does not protect all transaction-related data from exposure during a breach, we need to take a look at a broad range of complementary technologies, such as tokenization, encryption...
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at software provider CA Technologies.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
High-profile security breaches globally have had a cascading effect on Indian organizations. Intel Security's Chris Young discusses how Indian security practitioners must shift to a resilient security model.
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
Experts debate the value of new PCI guidance for how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Does the new advice go far enough?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.