{"id":655,"date":"2018-04-20T04:14:58","date_gmt":"2018-04-20T01:14:58","guid":{"rendered":"http:\/\/kusuaks7\/?p=260"},"modified":"2025-07-18T11:19:51","modified_gmt":"2025-07-18T11:19:51","slug":"rising-data-breaches-and-leaks-information-security-folks-need-to-think-ahead-of-the-attackers","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/rising-data-breaches-and-leaks-information-security-folks-need-to-think-ahead-of-the-attackers\/","title":{"rendered":"Rising data breaches and leaks: Information security folks need to think ahead of the attackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"655\" class=\"elementor elementor-655\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4f2e7004 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f2e7004\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53261509\" data-id=\"53261509\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3257fda1 elementor-widget elementor-widget-text-editor\" data-id=\"3257fda1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Data Science? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/tracks\/data-science-training-certification\">Data Science Training and Certification<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-f277204 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f277204\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c163280\" data-id=\"c163280\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98516b7 elementor-widget elementor-widget-text-editor\" data-id=\"98516b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe increasing security threat surface is a major challenge for businesses, particularly those functioning in the BFSI sector. There has been a lot of news of frauds as well as hacking\u00a0from this sector, which is giving CISOs sleepless nights. In this context,\u00a0<a href=\"http:\/\/dynamicciso.com\/blog-details\/08e6bea8e90ba87af3c9554d94db6579.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"broken_link\">Chief Information Security Officers (CISOs) not only have to act as defenders but also think ahead of the curve. As technologies continue to evolve rapidly, they have their task cut out for them.\u00a0<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-76e083c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76e083c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bddf0be\" data-id=\"bddf0be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1548f19 elementor-widget elementor-widget-text-editor\" data-id=\"1548f19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote>\u201cThere has been increasing flow of news that a lot of fraud is happening on the backend. In such a scenario, a CISO has little options but to stay ahead of the hackers. He has to put the most modern security tools and technologies at the forefront and judiciously choose from the products available in the market such as fraud management systems, SOC, or technologies like DNS solutions, Anti-APT, NAC, Encryption at all levels, robust endpoint enterprise antivirus and patch management solutions etc. CISOs should have the best-in-house security analysts to face the latest threats. But the catch is that it should be implemented quickly and with desired outcomes,\u201d says\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/anshuman-pund-25b2ba20\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">Anshuman Pund, Head &#8211; Information Security &amp; ISO Compliance, IDBI Intech Limited<\/a>.<\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c772038 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c772038\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1dfe6fd\" data-id=\"1dfe6fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab4f2c9 elementor-widget elementor-widget-text-editor\" data-id=\"ab4f2c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis is particularly important as the latest security threats such as ransomware,\u00a0<a href=\"https:\/\/krebsonsecurity.com\/tag\/memcached-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Memchached attacks<\/a>,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Petya_(malware)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Petya<\/a>\u00a0keep piling up, putting the CISO on the defensive. Modern attacks can cripple the operations of an organization and can irreparably damage a company\u2019s reputation. Losses can run into millions of dollars. Global pharma giant Merc lost $300 million dollars in just one quarter due to a cyber-attack. The biggest headache of a CISO is that threats keep on emanating from both within and outside organization.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-6a118e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a118e4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d69a9db\" data-id=\"d69a9db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7aca5bf elementor-widget elementor-widget-text-editor\" data-id=\"7aca5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote>There are threats from the outside as well as from the inside. We have to be equipped to handle both. Attempts are also made on data going out of the perimeter.\u00a0<a href=\"http:\/\/dynamicciso.com\/blog-details\/08e6bea8e90ba87af3c9554d94db6579.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"broken_link\">Patch management and endpoint security should be sound enough to handle such incidents. Patches need to be updated for each and every system, so that advanced threats can be mitigated<\/a>.<\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a331789 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a331789\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77f206f\" data-id=\"77f206f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58dc7c9 elementor-widget elementor-widget-text-editor\" data-id=\"58dc7c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDigital deployments bring with them increased vulnerabilities. The attack surface has increased because of the extensions within enterprise. Frequency and sophistication of cyber threats are continuously growing. In the evolving threat landscape, digital transformation technologies such as Artificial Intelligence and Machine Learning hold a great deal of hope.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-16da808 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16da808\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b46982\" data-id=\"9b46982\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6833231 elementor-widget elementor-widget-text-editor\" data-id=\"6833231\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote>This is a cat and mouse game where we are trying to update our security strategies and at the same time new threats are emerging at the speed of light. New technologies such as AI and ML can help in proactive threat detection and mitigation. A lot of it can be automated.<\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-6ab300e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ab300e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e8252c\" data-id=\"5e8252c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9440abc elementor-widget elementor-widget-text-editor\" data-id=\"9440abc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere is little doubt that attackers are getting more sophisticated with every passing day. Moreover, the they make significant investment of resources to bypass security checks as well as the latest technology tools. Therefore, cyber security professionals need to evolve rapidly to stay ahead of the attackers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-fd42350 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd42350\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-999886f\" data-id=\"999886f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f5d0a48 elementor-widget elementor-widget-text-editor\" data-id=\"f5d0a48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/dynamicciso.com\/blog-details\/08e6bea8e90ba87af3c9554d94db6579.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"broken_link\">First published on dynamicCISO.com<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The increasing security threat surface is a major challenge for businesses, particularly those functioning in the BFSI sector.&nbsp;There has been a lot of news of frauds as well as hacking&nbsp;from this sector, which is giving Chief Information Security Officers sleepless nights. Digital deployments bring with them increased vulnerabilities. The attack surface has increased because of the extensions within enterprise. Frequency and sophistication of cyber threats are continuously growing. In the evolving threat landscape, digital transformation technologies such as Artificial Intelligence and Machine Learning hold a great deal of hope.<\/p>\n","protected":false},"author":34,"featured_media":3523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[94],"ppma_author":[1676],"class_list":["post-655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-data-science"],"authors":[{"term_id":1676,"user_id":34,"is_guest":0,"slug":"muqbil-ahmar","display_name":"Muqbil Ahmar","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Ahmar","first_name":"Muqbil","job_title":"","description":"Muqbil Ahmar is a tech evangelist, environmentalist, women&#039;s rights advocate, editor, and founder of&nbsp;<a href=\"http:\/\/www.greenubuntu.com\/\" target=\"_blank\" rel=\"noopener\">www.greenubuntu.com<\/a>.&nbsp;&nbsp; He writes on new digital technologies such as Cloud, Big Data, IoT, Blockchain, Artificial Intelligence, Machine Learning, etc. He also writes on the economy, films, arts and culture, and other diverse subjects.Connect with him on Facebook, LinkedIn, and Twitter.\n\n<img src=\"https:\/\/ssl.gstatic.com\/ui\/v1\/icons\/mail\/images\/cleardot.gif\" \/>"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=655"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/655\/revisions"}],"predecessor-version":[{"id":37993,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/655\/revisions\/37993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3523"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=655"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}