Unified endpoint management exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT and security leaders approach UEM? John Harrington Jr. and Ryan Schwartz of IBM MaaS360 with Watson share insight.
Almost a year after it went into full effect, compliance with the EU's GDPR still presents challenges, including monitoring data in a decentralized environment, says Subhajit Deb, CISO at Dr. Reddy's Laboratories. He'll be a featured speaker at ISMG's Fraud and Breach Summit in Bengaluru on May 21.
Enterprises today have many digital ways of interacting with their customers - and therefore just as many ways for authenticating those users and transactions. Sesh Venkataraman of CA Technologies explains the business value of omnichannel authentication solutions.
The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup. Trend's Greg Young shares insight from this report.
The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.
ISMG and Zscaler hosted a roundtable dinner in Columbus, OH on Feb. 22 focused on security's role in digital transformation. Managing expectation for security as a core component of business enablement was a core component of the discussion.
In the latest stop in this roundtable dinner series, ISMG and Zscaler visited Seattle on Feb. 26 to discuss security's role as a catalyst for digital transformation. It was a diverse crowd - and a mature conversation, says Bil Harmer, Americas CISO with Zscaler.
The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic. Kevin Stewart of F5 Networks explains why network visibility is not enough to detect these attacks.
Fraud incidents and losses have remained steady or increased in the past year, according to ISMG's latest Faces of Fraud Survey. And the biggest fault of banking institutions' current anti-fraud controls: They rely too much on manual processes. Mike Lopez of survey sponsor Cyxtera Technologies analyzes the results and...
The latest edition of the ISMG Security Report features an analysis of why Google was one of the first companies to be hit with a major GDPR fine, plus a global update on GDPR compliance trends and an in-depth report on shifts in malware.