academic and careers Telework Leads to Changes in India's 2020 Cybersecurity Policy By www.inforisktoday.asia Published On :: India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator. Full Article
academic and careers Analysis: The Contact-Tracing Conundrum By www.inforisktoday.asia Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
academic and careers Testing Medical Device Security During COVID-19 Crisis By www.inforisktoday.asia Published On :: As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec. Full Article
academic and careers Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.inforisktoday.asia Published On :: Full Article
academic and careers Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.asia Published On :: Full Article
academic and careers Live Webinar | How to avoid the security dangers with working from home (WFH) By www.inforisktoday.asia Published On :: Full Article
academic and careers Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.inforisktoday.asia Published On :: Full Article
academic and careers FDIC: Tips on Preparing Financially for a Natural Disaster or a Fire By www.inforisktoday.asia Published On :: The summer 2011 issue of 'FDIC Consumer News' features tips on how to prepare financially for a natural disaster, a fire or another tragedy, especially one that requires people to evacuate their home and not return for days or weeks. Full Article
academic and careers RBI: Know Your Customer Norms - Letter Issued by UIDAI By www.inforisktoday.asia Published On :: The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005. Full Article
academic and careers RBI: Anti-Money Laundering, Combating of Financing of Terrorism Standards By www.inforisktoday.asia Published On :: The Reserve Bank of India on Sept. 22, 2011, issued a letter to financial institutions regarding anti-money laundering and the combating of financing of terrorism standards. Full Article
academic and careers RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions By www.inforisktoday.asia Published On :: The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Full Article
academic and careers Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.asia Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
academic and careers Zoom's NY Settlement Spells Out Security Moves By www.inforisktoday.asia Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
academic and careers APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.inforisktoday.asia Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
academic and careers Hackers Try to Sell 26 Million Breached Records: Report By www.inforisktoday.asia Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
academic and careers Digital Contact-Tracing Apps: Hype or Helpful? By www.inforisktoday.eu Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
academic and careers Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.eu Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
academic and careers Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.eu Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
academic and careers Why Are We So Stupid About RDP Passwords? By www.inforisktoday.eu Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
academic and careers Improving Data Governance During the COVID-19 Crisis By www.inforisktoday.eu Published On :: To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec. Full Article
academic and careers Analysis: Ransomware's Costly Impact By www.inforisktoday.eu Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
academic and careers Analysis: The Contact-Tracing Conundrum By www.inforisktoday.eu Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
academic and careers Testing Medical Device Security During COVID-19 Crisis By www.inforisktoday.eu Published On :: As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec. Full Article
academic and careers Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.inforisktoday.eu Published On :: Full Article
academic and careers Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.eu Published On :: Full Article
academic and careers Live Webinar | How to avoid the security dangers with working from home (WFH) By www.inforisktoday.eu Published On :: Full Article
academic and careers Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.inforisktoday.eu Published On :: Full Article
academic and careers ENISA Launches Guide on Building Effective IT Security Public Private Partnerships By www.inforisktoday.eu Published On :: The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships. Full Article
academic and careers ENISA: Technical Guidelines on Minimum Security Measures By www.inforisktoday.eu Published On :: ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks. Full Article
academic and careers ENISA: Guidelines on Incident Reporting By www.inforisktoday.eu Published On :: ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents. Full Article
academic and careers ENISA: Cybersecurity Aspects in the Maritime Sector By www.inforisktoday.eu Published On :: ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks. Full Article
academic and careers Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.eu Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
academic and careers Zoom's NY Settlement Spells Out Security Moves By www.inforisktoday.eu Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
academic and careers APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.inforisktoday.eu Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
academic and careers Hackers Try to Sell 26 Million Breached Records: Report By www.inforisktoday.eu Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
academic and careers Digital Contact-Tracing Apps: Hype or Helpful? By www.databreachtoday.com Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
academic and careers Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.databreachtoday.com Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
academic and careers Digital Contact-Tracing Apps Must Win Hearts and Minds By www.databreachtoday.com Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
academic and careers Why Are We So Stupid About RDP Passwords? By www.databreachtoday.com Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
academic and careers Analysis: Ransomware's Costly Impact By www.databreachtoday.com Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
academic and careers Addressing Telehealth, Telework Security Amid COVID-19 By www.databreachtoday.com Published On :: With more employees working remotely and a much heavier demand for telehealth services, entities need to consider extra, accelerated steps in keeping data and systems secure, says Martin Littmann, Kelsey-Seybold Clinic CISO, and Stephen Moore, a former security leader at Anthem. Full Article
academic and careers Analysis: The Contact-Tracing Conundrum By www.databreachtoday.com Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
academic and careers Testing Medical Device Security During COVID-19 Crisis By www.databreachtoday.com Published On :: As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec. Full Article
academic and careers Live Webinar | How to avoid the security dangers with working from home (WFH) By www.databreachtoday.com Published On :: Full Article
academic and careers Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2 By www.databreachtoday.com Published On :: Full Article
academic and careers Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning By www.databreachtoday.com Published On :: Full Article
academic and careers Live Webinar | 2021: A Cybersecurity Odyssey By www.databreachtoday.com Published On :: Full Article
academic and careers ENISA: Software vulnerability prevention initiatives By www.databreachtoday.com Published On :: The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities. Full Article
academic and careers Accounting of Disclosures Under the HITECH Act By www.databreachtoday.com Published On :: A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures of protected health information and add new requirements for access reports. Full Article
academic and careers FFIEC Final Authentication Guidance By www.databreachtoday.com Published On :: The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. Full Article