Privacy and security practitioners wonder if Aadhaar data collected by private firms can actually be deleted in the next six months as directed by the Supreme Court of India, which recently determined that it's unconstitutional for companies to collect or ask for Aadhaar data from consumers.
Step away from the social media single sign-on services, cybersecurity experts say, citing numerous privacy and security risks. Instead, they recommend that everyone use password managers to create unique and complex passwords for every site, service or app they use.
One mystery with the recently discovered payment card sniffing attacks against such organizations as British Airways and Newegg has been how attackers might have first gained access to the victims' networks. But a number of cybercrime markets sell such access, in some cases for as little as 50 cents.
Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that cannot operate in real time, says Matthew Moynahan, CEO at Forcepoint.
Forty-eight percent of customers drop the products and services
of organizations that have had a publicly-disclosed data breach.
This is but one of the findings of the new 2018 Global State of
Online Digital Trust study commissioned by CA Technologies.
The new research study, developed by Frost and...
While support for cloud infrastructure is rapidly maturing and more vendors are adding behavior analytics and privileged task automation, pricing and licensing remain variable. Security and risk management leaders should evaluate multiple vendors with an eye on future requirements as well as costs.
Is your privileged access management system directly addressing the problems which face your business?
Download this white paper and learn:
How privileged accounts should be used by one system to connect to other accounts used to run service programs;
Best practices for processes, policies and technology used to...
The new India Post Payments Bank will take banking to the doorstep by using India's mammoth network of post offices. Postmen will perform digital transactions on their phones. That's raising concern among security leaders, who recommend adopting defense-in-depth security.
U.K. health and beauty retailer Superdrug Stores is warning customers that attackers may have compromised some of their personal information, apparently because they'd reused their credentials on other sites that were hacked. While Superdrug quickly notified victims, it stumbled in three notable ways.
A cryptocurrency investor is suing AT&T for $240 million, alleging he lost $24 million in virtual currency after the carrier failed to stop two separate attacks where his phone number was commandeered by attackers. The incident highlights the dangers of using a phone number as an authentication channel.
In the wake of digital transformation and several large, high-profile data breaches - and at a time where all the personal information is shared in the social network - traditional forms of digital identity verification are no longer valid.
Customers have zero patience for extra steps, and yet they expect their...
Forty-eight percent of customers drop the products and services of organizations that have had a publicly-disclosed data breach. This is but one of the findings of the new 2018 Global State of Online Digital Trust study commissioned by CA Technologies. CA's David Duncan analyzes the results.
UIDAI, which administers the Aadhaar program, has some simple advice: Avoid behaviors such as what R.S. Sharma, chairman of the Telecom Regulatory Authority in India, did on Saturday, when he tweeted his Aadhaar number.