An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm.
The U.S. Commerce Department is banning the downloading and hosting of China-based social media apps TikTok and WeChat effective on Sunday, citing national security concerns. The announcement comes as Oracle continues to negotiate a deal for partnering on TikTok's U.S. operations.
The latest edition of the ISMG Security Report analyzes whether a leaked database compiled by a Chinese company should be a cause for serious concern. Also featured are discussions on vulnerability disclosure challenges and risks posed by using social media apps for payments.
Potentially capping a fraught political showdown, China's TikTok, which is owned by Beijing-based ByteDance, has chosen Oracle to be its U.S. "technology partner," rejecting a bid by Microsoft. But Chinese state media suggests reports of a deal might be premature.
A bipartisan bill looks to take some initial steps toward creating nationwide digital identity standards that can address a range of security issues, including theft and fraud stemming from data breaches. The legislation is backed by the Better Identity Coalition.
Independent bug hunters who find flaws in products and services often struggle to hand off their vulnerability report to someone in a position to get it fixed, says longtime security researcher Daniel Cuthbert. He describes steps organizations must take to be able to receive - and act on - bug reports.
The latest edition of the ISMG Security Report analyzes how criminals keep finding new ways to make ransomware victims pay. Also featured: Preventing digital currency counterfeits; a proposed health data privacy framework.
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
Traditional methods of signing forms and documents are moving from paper to paperless, and banks are increasingly turning to e-signatures to better serve customers that are looking for modern, digital, convenient banking services.
This guide gives a comprehensive overview for how the digital route provided by...
From account opening to HR, banks and other FIs have thousands of forms that can use e signature. While demand for e signature is high among all lines of business, the question is: where to start? And from there, what is the best way to extend e signatures across the enterprise?
To learn which processes are the best...
Nowadays, companies are striving to provide their customers with the easiest, fastest, and secure user signing experience in the channel or device of their choice.
How do you build an optimal user experience across all channels, while ensuring compliance?
Download this white paper and discover best practices to...
Customers expect a fully digital account opening process - available online and on mobile. Banks, credit unions, and other financial institutions (FIs) need to offer customer-centric, mobile-first account opening and customer agreement experiences to convert customers and drive growth.
This white paper provides...
Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
A flaw in how contactless cards from Visa - and potentially other issuers - have implemented the EMV protocol can be abused to bypass PIN verification for high-value transactions, ETH Zurich researchers warn. But Visa says the exploits would be "impractical for fraudsters to employ" in real-world attacks.