Hacking

Three out of four organizations lack proper incident response plans: IBM-Ponemon report

There’s no denying that fortifying defenses is the first step to cyber-resiliency. What takes a back seat though, is the lack of proper incident response plans. IBM-Ponemon’s 2018 cyber-resiliency study reveals 77 percent of firms lack proper incident response plans.

Adopt new tech, but proceed with caution: Vijay R, Mahindra & Mahindra Financial Services

The CISO of Mahindra & Mahindra Financial Services reveals why security leaders need to be upfront about things and prepare for the outcome of every strategy.

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

Mobile ransomware, banking malware threats on a rise: Report

The number of unique mobile malware samples increased to 108,439 in 2017, which was 94 percent more than the total in 2016.

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

2017 Equifax breach could well be the most expensive hack ever

The 2017 Equifax breach is worse than we thought –the company reveals that 2.4 million more accounts were affected.

SEC eyes crackdown on cryptocurrencies

As part of an ongoing regulatory clampdown, the SEC has issued subpoenas and wants info from tech companies issuing cryptocurrencies in the form of ICOs.

New Cyber Security Style Guide helps bridge the communication gap

Poor communication is a security flaw. Time to patch.

SWIFT misuse: Why RBI's missive to Indian banks matters

RBI has set April 30th as the deadline for banks to link their CBS with SWIFT. Here are five cases of SWIFT misuse that led to a cybersecurity nightmare, which could have been avoided.

Aadhaar hack encore: Basic SQL injection exposes 96 lakh accounts

A security researcher brings to light the absolute ease with which Aadhaar data can be accessed.