Mark Frogoso, VP and Group CISO at Mynt, the largest fintech company in the Philippines and the operator of the No.1 e-wallet in the country - GCash, says that IoT and cloud technologies, digital transformation, digital realities, AI/ML and quantum computing are the technology trends that hold the most promise.
Think your organization is ready to go passwordless? Check out our guide to your passwordless authentication rollout. Learn about the phases of the journey and what your first few weeks might look like.
To achieve transformative business objectives, stay competitive and meet user expectations, enterprises are undergoing a digital transformation, also known as modernization.
This shift to a decentralized, identity-centric operational model has placed increased importance on ensuring secure access for users. The...
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
OMB on Wednesday released a federal strategy to move the U.S. government toward mature zero trust architectures. White House officials say the new strategy - with a focus on MFA, asset inventories, traffic encryption, and more - is a key step in delivering on Biden's May 2021 executive order.
U.S. President Joe Biden today signed a National Security Memorandum that aims to improve the cybersecurity of national security systems. The memo gives new powers to the NSA to oversee cybersecurity improvements such as the use of the multifactor authentication, encryption and endpoint detection services.
In this whitepaper, you'll learn how organizations can confidently move their most mission-critical workloads to a secure, compliant, and reliable cloud with ServiceNow on Microsoft Azure.
The Singapore Personal Data Protection Commission has fined Commeasure Pte. Ltd., which operates hotel booking platform RedDoorz, S$74,000 - or U.S. $54,637 - for what the commission called the "largest data breach" since its inception in 2012, which put at risk 5.9 million customer records.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
While organizations are increasingly adopting data encryption to ensure that data cannot be accessed even if a breach occurs, one challenge remains. Cloud providers often hold the encryption keys for their clients, giving them unfettered access to their data.
Download this eBook and learn how to:
Ensure that...
Enterprises across industry segments are moving IT workloads and functions to the cloud, frequently ahead of any strategy or consistent capability to secure sensitive data. The advantages of cloud migration, such as scale, agility, and consumption-based pricing, are compelling.
This white paper describes the...
Allegiant characterizes itself as more of an e-commerce company than an airline, because 94% of its revenue comes through the website. As such, they needed another level of data security.
Download this case study to learn how Allegiant changed its security practices by:
Deploying Voltage SecureData with Secure...
Security researchers identified flaws in messaging app Telegram's cryptographic protocol, MTProto, that enabled intruders to access encrypted chats and alter the messages. Those flaws have since been patched.
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.