EQ: The Big Picture from the CISO’s Window
Posted on: 27 Aug 2018
Missed vulnerabilities, insecure processes and malicious insiders may all lead to undesirable outcomes, since you may not have 100% control of these events. Even a direct report may have made…
Rogue mobile apps are common vector of fraud attacks
Posted on: 22 Aug 2018
Consumer fraud is increasingly committed via mobile phone applications, security firm RSA has revealed in its Quarterly Fraud Report. In its April 1-June 30, 2018 survey of global fraud trends,…
Security Current Announces All-Star CISO Editorial Board to Set Direction for Peer-Driven Content
Posted on: 21 Aug 2018
Security luminaries guide development of purposeful content and collaborative events for their executive peers Security Current today announced its executive-level Editorial Board that is guiding the development of the organization’s…
Faxploit: New research reveals how criminals can target fax machines and spread malware
Posted on: 20 Aug 2018
Check Point researchers have announced newly discovered vulnerabilities that affect tens of millions of fax devices in businesses and homes worldwide. These breaches, dubbed Faxploit, leave the door open for…
Berin Lautenbach, CISO for Asia-Pacific, Telstra
Posted on: 19 Aug 2018
Lucking out “I wish I could tell you I planned it all, and that this was all thought through,” says Berin Lautenbach of his path from the start of his…
No longer an afterthought: Security analytics takes its place in business strategy
Posted on: 10 Aug 2018
There are two philosophical schools as to how companies can protect their system. They can either do it prescriptively, telling people what they can or cannot do. The problem with…
Israeli cybersecurity firm exposes hacking
Posted on: 09 Aug 2018
Check Point says WhatsApp weakness enables attackers to send false information Check Point Software Technologies said Wednesday it had uncovered a security flaw in WhatsApp that gives hackers the possibility…
Malicious Email Detector: Israeli Researchers Develop New Method to Stop Threatening Email
Posted on: 08 Aug 2018
Too often harmless-looking email in fact contains dangerous attachments or links. Researchers at Israel’s Ben-Gurion University have found a new method that uses machine learning algorithms to detect malicious emails…
David Gee, Head of Cybersecurity – Asia Pacific, HSBC
Posted on: 01 Aug 2018
When he gets some quiet time away from his job as head of cybersecurity for Asia Pacific at banking giant HSBC, David Gee does yoga. “Yoga is a metaphor for…
The SingHealth breach: A rude awakening
Posted on: 24 Jul 2018
Singapore’s much vaunted cybersecurity defenses were overcome in a data breach that compromised the personal data of over a quarter of the Southeast Asian nation’s population. Personal data of 1.5 million patients were…