an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.in Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Bangladesh CIRT to Build Sensor Network for Banks By www.inforisktoday.in Published On :: The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy. Full Article
an Telework Leads to Changes in India's 2020 Cybersecurity Policy By www.inforisktoday.in Published On :: India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator. Full Article
an Analysis: The Contact-Tracing Conundrum By www.inforisktoday.in Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
an Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.in Published On :: Full Article
an Live Webinar | How to avoid the security dangers with working from home (WFH) By www.inforisktoday.in Published On :: Full Article
an FDIC: Tips on Preparing Financially for a Natural Disaster or a Fire By www.inforisktoday.in Published On :: The summer 2011 issue of 'FDIC Consumer News' features tips on how to prepare financially for a natural disaster, a fire or another tragedy, especially one that requires people to evacuate their home and not return for days or weeks. Full Article
an RBI: Anti-Money Laundering, Combating of Financing of Terrorism Standards By www.inforisktoday.in Published On :: The Reserve Bank of India on Sept. 22, 2011, issued a letter to financial institutions regarding anti-money laundering and the combating of financing of terrorism standards. Full Article
an RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions By www.inforisktoday.in Published On :: The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Full Article
an Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.in Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
an Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.asia Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.asia Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Bangladesh CIRT to Build Sensor Network for Banks By www.inforisktoday.asia Published On :: The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy. Full Article
an Telework Leads to Changes in India's 2020 Cybersecurity Policy By www.inforisktoday.asia Published On :: India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator. Full Article
an Analysis: The Contact-Tracing Conundrum By www.inforisktoday.asia Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
an Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.asia Published On :: Full Article
an Live Webinar | How to avoid the security dangers with working from home (WFH) By www.inforisktoday.asia Published On :: Full Article
an FDIC: Tips on Preparing Financially for a Natural Disaster or a Fire By www.inforisktoday.asia Published On :: The summer 2011 issue of 'FDIC Consumer News' features tips on how to prepare financially for a natural disaster, a fire or another tragedy, especially one that requires people to evacuate their home and not return for days or weeks. Full Article
an RBI: Anti-Money Laundering, Combating of Financing of Terrorism Standards By www.inforisktoday.asia Published On :: The Reserve Bank of India on Sept. 22, 2011, issued a letter to financial institutions regarding anti-money laundering and the combating of financing of terrorism standards. Full Article
an RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions By www.inforisktoday.asia Published On :: The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Full Article
an Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.asia Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
an Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.eu Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.eu Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Improving Data Governance During the COVID-19 Crisis By www.inforisktoday.eu Published On :: To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec. Full Article
an Analysis: Ransomware's Costly Impact By www.inforisktoday.eu Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
an Analysis: The Contact-Tracing Conundrum By www.inforisktoday.eu Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
an Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.eu Published On :: Full Article
an Live Webinar | How to avoid the security dangers with working from home (WFH) By www.inforisktoday.eu Published On :: Full Article
an Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.eu Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
an Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.bankinfosecurity.co.uk Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.bankinfosecurity.co.uk Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Analysis: COVID-19 Contact-Tracing Privacy Issues By www.bankinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust." Full Article
an Analysis: Ransomware's Costly Impact By www.bankinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
an Analysis: The Contact-Tracing Conundrum By www.bankinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
an Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.bankinfosecurity.co.uk Published On :: Full Article
an Your Phone and Your Face: Anchoring Users to Real Identities By www.bankinfosecurity.co.uk Published On :: Full Article
an Live Webinar | How to avoid the security dangers with working from home (WFH) By www.bankinfosecurity.co.uk Published On :: Full Article
an Ransomware Slams Healthcare, Logistics, Energy Firms By www.bankinfosecurity.co.uk Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
an Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.databreachtoday.com Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.databreachtoday.com Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Analysis: Ransomware's Costly Impact By www.databreachtoday.com Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
an Analysis: The Contact-Tracing Conundrum By www.databreachtoday.com Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
an Live Webinar | How to avoid the security dangers with working from home (WFH) By www.databreachtoday.com Published On :: Full Article
an Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning By www.databreachtoday.com Published On :: Full Article
an FFIEC Final Authentication Guidance By www.databreachtoday.com Published On :: The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. Full Article
an Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.com Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
an Webcast: Keeping Remote Workers Safe and Your Work Secure By www.databreachtoday.com Published On :: This webcast gives 6 tips for keeping employees safe and mitigating security threats as your workforce goes remote.Learn how to protect employees from malicious web content. Full Article
an Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.co.uk Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
an Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.co.uk Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
an Improving Data Governance During the COVID-19 Crisis By www.inforisktoday.co.uk Published On :: To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec. Full Article