| |NOVEMBER 20195VOL 2 · ISSUE 9 - 2 · NOVEMBER - 2019Accelerated digital innovation is a double-edged sword that cuts the cybersecurity landscape along its swing. Companies rapidly pursuing digital transformation to compete, are only getting more vulnerable to cyber disruption and theft. The problem is that cyber criminals are innovating in lockstep or, in some cases, at a greater rate. One of the most disturbing reports of 2018 indicated that cyber criminals had graduated from hacking software to hacking the computer hardware in global supply chains. By end of the year, the technology industry continued to debate the validity of a mainstream media report of widespread, malicious chips. ("Feasible maybe, not practical," one CEO remarked.) While the report would represent the most significant hardware exploit to date, it would not be the first--nor probably the last. Compromised hardware can be very difficult to detect, and the implications for such advances as IoT could be dramatic. Meanwhile, the cyber battle continues at the software level, where attacks also became more sophisticated in 2018. Both hardware and software will continue to draw fire from malicious actors in 2019.For every major new technology being deployed in the business world, from artificial intelligence (AI) to distributed ledger technology (DLT) to the Internet of Things (IoT), corresponding exploits and malware are being pushed into production in the world of cybercrime--with data poisoning, cryptojacking, and malicious chips among the latest to emerge.More so, As the move to anytime, anywhere mobile access to anything continues apace, authentication attacks will also increase. And, as methods of verifying mobile user identities evolve, from passwords to fingerprints, faces, and behavioral biometrics (e.g., how a particular user typically handles their phone and its features), attackers will keep looking for implementation flaws to exploit. Evolving authentication techniques may not have inherent vulnerabilities, but they could be open to attack if poorly configured. Recent research indicates possible exploits of fingerprint authentication using AI-generated synthetic fingerprints.There are several such vulnerabilities and its appropriate solutions in the market. In this edition we throw light on those solution providers who are hell bent on making the world a safer place to conduct business.Do let us know what you think . Emmanuel Christi DasEditoremmanuel@cioinsiderindia.comNeed for a Safe Haven for Businesses Office Editorial queries editor@cioinsiderindia.comAdvertising queriessales@cioinsiderindia.comBangaloreTel 080 46441103 To subscribeVisit www.cioinsiderindia.com/magazine-in or send email to: subscription@cioinsiderindia.comCover price is Rs 150 per issueAshok KumarSales & MarketingRavi KalgiGroup Art DirectorMagendran PerumalCirculation ManagerEditorial TeamChitra MishraShiwani PrakashSaroop K PAnitha TLakshmi GCIOInsiderNo. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugheshpalya, Bangalore-560017Mohana KrishnanS SivasankarVisualizer PublisherEditorAlok ChaturvediEmmanuel Christi DasPrinted and published by Alok Chaturvedi on Behalf of SiliconMedia Technologies Pvt Ltd and Printed at Precision Fototype Services at Sri Sabari Shopping Complex, 24 Residency Road Bangalore-560025 and Published at No. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugeshpalya, Bangalore-560017.Copyright © 2019 SiliconMedia Technologies Pvt Ltd, All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher.EditorialShashi Ranjan
<
Page 4 |
Page 6 >