Security Current


EQ: The Big Picture from the CISO’s Window

Posted on: 27 Aug 2018

Missed vulnerabilities, insecure processes and malicious insiders may all lead to undesirable outcomes, since you may not have 100% control of these events. Even a direct report may have made…

Rogue mobile apps are common vector of fraud attacks

Posted on: 22 Aug 2018

Consumer fraud is increasingly committed via mobile phone applications, security firm RSA has revealed in its Quarterly Fraud Report. In its April 1-June 30, 2018 survey of global fraud trends,…

Security Current Announces All-Star CISO Editorial Board to Set Direction for Peer-Driven Content

Posted on: 21 Aug 2018

Security luminaries guide development of purposeful content and collaborative events for their executive peers Security Current today announced its executive-level Editorial Board that is guiding the development of the organization’s…

Faxploit: New research reveals how criminals can target fax machines and spread malware

Posted on: 20 Aug 2018

Check Point researchers have announced newly discovered vulnerabilities that affect tens of millions of fax devices in businesses and homes worldwide. These breaches, dubbed Faxploit, leave the door open for…

Berin Lautenbach, CISO for Asia-Pacific, Telstra

Posted on: 19 Aug 2018

Lucking out “I wish I could tell you I planned it all, and that this was all thought through,” says Berin Lautenbach of his path from the start of his…

No longer an afterthought: Security analytics takes its place in business strategy

Posted on: 10 Aug 2018

There are two philosophical schools as to how companies can protect their system. They can either do it prescriptively, telling people what they can or cannot do. The problem with…

Israeli cybersecurity firm exposes hacking

Posted on: 09 Aug 2018

Check Point says WhatsApp weakness enables attackers to send false information Check Point Software Technologies said Wednesday it had uncovered a security flaw in WhatsApp that gives hackers the possibility…

Malicious Email Detector: Israeli Researchers Develop New Method to Stop Threatening Email

Posted on: 08 Aug 2018

Too often harmless-looking email in fact contains dangerous attachments or links. Researchers at Israel’s Ben-Gurion University have found a new method that uses machine learning algorithms to detect malicious emails…

David Gee, Head of Cybersecurity – Asia Pacific, HSBC

Posted on: 01 Aug 2018

When he gets some quiet time away from his job as head of cybersecurity for Asia Pacific at banking giant HSBC, David Gee does yoga. “Yoga is a metaphor for…

The SingHealth breach: A rude awakening

Posted on: 24 Jul 2018

Singapore’s much vaunted cybersecurity defenses were overcome in a data breach that compromised the personal data of over a quarter of the Southeast Asian nation’s population.  Personal data of 1.5 million patients were…