The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023. Member States have until October 2024 to transpose it into their national law. One of the most critical changes with…
Tag: Blog
The 8 Most Common Causes of Data Breaches
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The 8 Most Common Causes of Data Breaches
Data Matters ? The Value of Visibility in API Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Data Matters ? The Value of Visibility in API Security
Empowering Change: Using Your Influence to Confront the Climate Crisis
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Empowering Change: Using Your Influence to Confront the Climate Crisis
Five Key Takeaways from the 2024 Imperva Bad Bot Report
Bad bots continue to affect consumers and organizations across all sectors. For over eleven years, Imperva has been dedicated to helping organizations manage and mitigate the threat of bad bots. We’ve published the 2024 Imperva Bad Bot Report as part…
Comparing the Benefits of Microsegmentation vs. VLANs
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Comparing the Benefits of Microsegmentation vs. VLANs
How to Dramatically Simplify PCI DSS Compliance
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Dramatically Simplify PCI DSS Compliance
Shield NS53 Protects Your Origin DNS Infrastructure from NXDOMAIN Attacks
Why payers are pivotal to API security across the healthcare ecosystem
Keep Your Tech Flame Alive: Akamai Trailblazer Alex Virley
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Keep Your Tech Flame Alive: Akamai Trailblazer Alex Virley
HTTP/2 CONTINUATION Flood Vulnerability
HTTP/2, a widely adopted web communication protocol, organizes data transmission through a binary framing layer, wherein all communication is divided into smaller messages called frames, each identified by a specific type, such as headers, data, and continuation frames. HTTP/2 HEADER…
Welcome to 2024: A Year in Review with Akamai Hunt
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Welcome to 2024: A Year in Review with Akamai Hunt
KeyTrap Highlights Need for Enduring DNS Defenses for Service Providers
DNS resolvers must be highly resilient to malicious activity like DoS attacks and cache poisoning. Akamai CacheServe delivers enduring defenses. This article has been indexed from Blog Read the original article: KeyTrap Highlights Need for Enduring DNS Defenses for Service…
Our People and Our Growth: Key Drivers of Akamai?s ESG Strategy
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Our People and Our Growth: Key Drivers of Akamai?s ESG Strategy
XZ Utils Backdoor ? Everything You Need to Know, and What You Can Do
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: XZ Utils Backdoor ? Everything You Need to Know, and What You…
Announcing Flow-IPC, an Open-Source Project for Developers to Create Low-Latency Applications
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Announcing Flow-IPC, an Open-Source Project for Developers to Create Low-Latency Applications
The Sustainability Team Is Listening. Here?s What We Heard.
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Sustainability Team Is Listening. Here?s What We Heard.
Compromising Bank Customer Trust: The Price of Inadequate Data Protection
Banks hold not just money, but also emotions and aspirations. Countless stories unfold within bank walls, reflecting the intimate connection between money and emotion. Beyond the numbers and transactions, every dollar represents individuals’ hopes, dreams, and livelihoods. As the trusted…
Honey, I Lost My Credentials! Finding Plaintext Credentials on the Internet
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Honey, I Lost My Credentials! Finding Plaintext Credentials on the Internet
From ChatBot To SpyBot: ChatGPT Post Exploitation
In the second installment of our blog post series on ChatGPT, we delve deeper into the security implications that come with the integration of AI into our daily routines. Building on the discoveries shared in our initial post, “XSS Marks…
The Akamai Foundation Continues to Give Back and Amplify Impact
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Akamai Foundation Continues to Give Back and Amplify Impact
Distributed Cloud and Edge Computing: A Cheat Sheet for IT Leaders
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Distributed Cloud and Edge Computing: A Cheat Sheet for IT Leaders
Akamai Customer Trust Built on Partnership and Best User Experience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Customer Trust Built on Partnership and Best User Experience
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains
Lurking in the Shadows: Attack Trends Shine Light on API Threats
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Lurking in the Shadows: Attack Trends Shine Light on API Threats
Recognizing Progress and Living Our Values: Akamai?s 2023 ESG Impact Report
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Recognizing Progress and Living Our Values: Akamai?s 2023 ESG Impact Report
Discover the 3 Trends Driving API Security Compliance
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Discover the 3 Trends Driving API Security Compliance
What a Cluster: Local Volumes Vulnerability in Kubernetes
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What a Cluster: Local Volumes Vulnerability in Kubernetes
Cyber Strategy: Don?t Focus on Prevention ? Master Resilience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Cyber Strategy: Don?t Focus on Prevention ? Master Resilience
Understanding the OWASP API Security Top 10: Why BOLA is the Number One Risk for APIs
Understanding and addressing vulnerabilities is critical in cybersecurity, where APIs serve as the backbone for seamless data exchange. The OWASP API Security Top 10, revised in 2023, provides a comprehensive guide to the critical issues that organizations must tackle to…
State of the Cloud: Where We Are and Where We?re Heading
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: State of the Cloud: Where We Are and Where We?re Heading
Akamai Security Solutions ? Everywhere Your Business Meets the World
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Security Solutions ? Everywhere Your Business Meets the World
Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0
On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning with the new framework. As cybercriminals become more…
Leaking NTLM Credentials Through Windows Themes
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Leaking NTLM Credentials Through Windows Themes
Enhance Customers? Security Posture: Akamai SOCC Advanced Service
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Enhance Customers? Security Posture: Akamai SOCC Advanced Service
AkaNAT: How Akamai Uses Machine Learning to Detect Shared IPs
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: AkaNAT: How Akamai Uses Machine Learning to Detect Shared IPs
Elevate Your Web Monitoring Experience with Managed Web Monitoring
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Elevate Your Web Monitoring Experience with Managed Web Monitoring
Why it Pays to Have a Comprehensive API Security Strategy
In an era dominated by digital connectivity and rapid technological advancements, Application Programming Interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between diverse software applications. As API usage continues to grow, so does the need…
6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: 6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security
The Benefits of Microsegmentation for Compliance
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Benefits of Microsegmentation for Compliance
Address the Challenges of Compliance and Cybersecurity with Zero Trust
The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas. This article has been indexed from Blog Read the original article: Address the Challenges of Compliance and Cybersecurity…
Imperva Customers are Protected Against New SQL Injection Vulnerability in WordPress Plugin
A critical security flaw, identified as CVE-2024-1071, was discovered in the Ultimate Member plugin for WordPress, affecting over 200,000 active installations. This vulnerability has a high severity CVSS score of 9.8 and allows for SQL injection via the ‘sorting’ parameter…
Is Network Security Still a Thing in the Age of Public Cloud?
Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments. This article has been indexed from Blog Read the original article: Is Network Security Still a Thing in the Age of Public Cloud?
Learning from the LockBit Takedown
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Learning from the LockBit Takedown
Keep Your Tech Flame Alive: Akamai Trailblazer ? Richa Dayal
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Keep Your Tech Flame Alive: Akamai Trailblazer ? Richa Dayal
Latest Research Reveals Rise in API Attacks in 2023, Putting Businesses at Risk in 2024
The State of API Security in 2024 Report highlights how APIs and their increased usage are significantly changing the threat landscape. In 2023, the number of API-targeted attacks rose significantly. Attacks targeting the business logic of APIs constituted 27% of…
Healthcare Needs Risk-Based Cybersecurity for Comprehensive, Effective Protection
In the first blog post of this three-blog series, we discussed the extraordinarily powerful “perfect storm” of cyber risk faced by healthcare organizations. The second blog post reviews how data security risks persist despite HIPAA compliance. In this third blog,…
Advocating for Inclusion in Tech
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Advocating for Inclusion in Tech
Threat Hunting Powered by Efficient and Straightforward Anomaly Detection on Your Data Lake
Effective monitoring and anomaly detection within a data environment are crucial, particularly in today’s data-driven landscape. At Imperva Threat Research, our data lake serves as the backbone for a range of critical functions, including threat hunting, risk analysis, and trend…
Imperva successfully defends against CVE-2024-25600 in WordPress Bricks Builder
A critical vulnerability in the Bricks Builder site builder for WordPress, identified as CVE-2024-25600, is currently under active exploitation, and poses a significant threat to over 25,000 sites. This flaw, with a CVSS score of 9.8, is an unauthenticated remote…
Is Network Security Still a Thing in the Age of Public Cloud?
Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments. This article has been indexed from Blog Read the original article: Is Network Security Still a Thing in the Age of Public Cloud?
Data Matters ? Empowering Threat Hunters to Reduce API Risk
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Data Matters ? Empowering Threat Hunters to Reduce API Risk
Exploitation Observed: Ivanti Connect Secure ? CVE-2023-46805 and CVE-2024-21887
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Exploitation Observed: Ivanti Connect Secure ? CVE-2023-46805 and CVE-2024-21887
Attackers Quick to Weaponize CVE-2023-22527 for Malware Delivery
On January 16, 2024, Atlassian disclosed a critical vulnerability affecting Confluence Data Center and Confluence Server, tracked as CVE-2023-22527. The vulnerability is an unauthenticated OGNL injection bug, allowing unauthenticated attackers to execute Java expressions, invoke methods, navigate object relationships, and…
The New York Times vs. OpenAI: A Turning Point for Web Scraping?
In a recent blog, we covered the blurry lines of legality surrounding web scraping and how the advent of artificial intelligence (AI) and large language models (LLMs) further complicates the matter. Shortly after publishing the blog, a significant legal development…
XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT
With its widespread use among businesses and individual users, ChatGPT is a prime target for attackers looking to access sensitive information. In this blog post, I’ll walk you through my discovery of two cross-site scripting (XSS) vulnerabilities in ChatGPT and…
Hacking Microsoft and Wix with Keyboard Shortcuts
Browser vendors continuously tweak and refine browser functionalities to improve security. Implementing same-site cookies is a prime example of vendors’ efforts to mitigate Cross-Site Request Forgery (CSRF) attacks. However, not all security measures are foolproof. In their quest to combat…
Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
What?s Next for Akamai?s Cloud Computing Strategy
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What?s Next for Akamai?s Cloud Computing Strategy
Python’s Colorama Typosquatting Meets ‘Fade Stealer’ Malware
As our hunt against malicious Python packages continues, Imperva Threat Research recently discovered an attempt to masquerade Fade Stealer malware as a nondescript package, Colorama. Why Colorama? Colorama is a package used by developers to add color and style to…
Imperva defends customers against CVE-2024-22024 in Ivanti products
Ivanti recently published an urgent warning about an authentication bypass in Ivanti Connect Secure, Ivanti Policy Secure, and ZTA gateways, tracked as CVE-2024-22024. The bug, which carries a severity score of 8.3, was discovered during an internal review. Since its…
The Added Value of SNI-Only Mode in Imperva Cloud WAF
Imperva has modified the default behavior for new cloud WAF sites, now enforcing Server Name Indication (SNI)-only traffic by default. This shift is aimed at optimizing the utilization of TLS-related features, both those currently in place and those slated for…
Data Matters ? Is Your API Security Data Rich or Data Poor?
Taking a data-rich approach to security is the most effective way to stay a step ahead of today?s quickly evolving API threats. This article has been indexed from Blog Read the original article: Data Matters ? Is Your API Security…
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
Security Flaw in CoCalc: One Click and Your Cloud is Ruined
TL;DR Imperva Threat Research discovered and reported a security flaw in the CoCalc Cloud environment. The flaw enabled potential attackers to completely take over a target’s account with only a single click from the victim. This flaw was due primarily…
Do Any HTTP Clients Not Support SNI?
In this blog post, we’ll share the results of an internal research project we conducted on our CDN customers focused on websites that are getting non-Server Name Indication (SNI) traffic. The goal of our research was to answer the following…
Akamai Named an Overall Leader for Zero Trust Network Access
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Named an Overall Leader for Zero Trust Network Access
The AnyDesk Breach: Overview and Recommendations
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The AnyDesk Breach: Overview and Recommendations
The Web Scraping Problem, Part 2: Use Cases that Require Scraping
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Web Scraping Problem, Part 2: Use Cases that Require Scraping
What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities
Stop Scrapers and Scalpers with Akamai Content Protector
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Stop Scrapers and Scalpers with Akamai Content Protector
The Web Scraping Problem, Part 3: Protecting Against Botnets
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Web Scraping Problem, Part 3: Protecting Against Botnets
Frog4Shell ? FritzFrog Botnet Adds One-Days to Its Arsenal
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Frog4Shell ? FritzFrog Botnet Adds One-Days to Its Arsenal
Imperva uncovers new Indicators of Compromise for FBI and CISA-flagged AndroxGh0st botnet
On January 16, a joint alert from FBI and CISA warned about a concerning development: the emergence of a botnet driven by AndroxGh0st malware targeting vulnerable applications and web servers. AndroxGh0st is a Python-based malware, first seen in late 2022,…
Optimizing Data Lakes: Streamlining Storage with Effective Object Management
Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and…
Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available
The Web Scraping Problem: Part 1
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Web Scraping Problem: Part 1
How Akamai Volunteers Helped Restore Costa Rica?s Most Polluted Beach
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How Akamai Volunteers Helped Restore Costa Rica?s Most Polluted Beach
Keep Your Tech FLAME Alive
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Keep Your Tech FLAME Alive
Imperva customers are protected against the recent GoAnywhere MFT vulnerability CVE-2024-0204
Recently, Fortra released a security advisory for CVE-2024-0204, a GoAnywhere MFT authentication bypass vulnerability. This bug allows an unauthenticated attacker to create an administrative user by exploiting an InitialAccountSetup.xhtml endpoint–accessible via path traversal–to initiate the administrative account setup page. This…
API Security: Best Practices for API Activity Data Acquisition
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: API Security: Best Practices for API Activity Data Acquisition
What Is API Detection and Response?
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What Is API Detection and Response?
Integrating mPulse?s Beacon API with EdgeWorkers to Visualize All Client Requests
Akamai mPulse combines with Akamai EdgeWorkers to visualize any client request and uses its http-request module to let users send their own requests. This article has been indexed from Blog Read the original article: Integrating mPulse?s Beacon API with EdgeWorkers…
Are You Ready for PCI DSS 4.0?
The Payment Card Industry Data Security Standard (PCI DSS) is the global benchmark for ensuring companies that handle credit card information maintain a secure environment. It provides a framework to help organizations protect sensitive cardholder data from theft and secure…
Reduce API Security Risk by Fixing Runtime Threats in Code Faster
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Reduce API Security Risk by Fixing Runtime Threats in Code Faster
Python’s Poisoned Package: Another ‘Blank Grabber’ Malware in PyPI
Python Package Index (PyPI) is a platform that offers an extensive range of packages to simplify and enhance the development process. Malicious actors regularly upload phishing packages in the platform’s repository aimed at delivering malware to steal the victim’s information,…
DPython’s Poisoned Package: Another ‘Blank Grabber’ Malware in PyPI
Python Package Index (PyPI) is a platform that offers an extensive range of packages to simplify and enhance the development process. Malicious actors regularly upload phishing packages in the platform’s repository aimed at delivering malware to steal the victim’s information,…
A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024
HTTP/2 Rapid Reset Mitigation With Imperva WAF
In the modern application landscape, where businesses are constantly under the threat of cyber attacks, one of the most recent to emerge is HTTP/2 Rapid Reset (CVE-2023-44487), a type of Distributed Denial-of-Service (DDoS) attack. This attack is larger than any…
Safeguarding Patient Health Data Means Balancing Access and Security
Increased access to health data can leave providers and insurers vulnerable to data breaches, so it?s vital to invest in cybersecurity that can protect networks. This article has been indexed from Blog Read the original article: Safeguarding Patient Health Data…
Imperva defends customers against recent vulnerabilities in Apache OFBiz
On December 26, researchers from SonicWall Capture Labs discovered an authentication bypass vulnerability in Apache OFBiz, tracked as CVE-2023-51467. This bug has a CVSS score of 9.8 and allows attackers to achieve server-side request forgery (SSRF) by bypassing the program’s…
How Cache Purge Helps Keep Your Website Content Fresh and Responsive
Content Delivery Networks (CDNs) accelerate web traffic across the internet through servers residing in strategic locations (known as points of presence or PoPs) across the globe. Each PoP has a number of caching servers, each of which contains a cached…
Weaponizing DHCP DNS Spoofing ? A Hands-On Guide
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Weaponizing DHCP DNS Spoofing ? A Hands-On Guide
Shifting from reCAPTCHA to hCaptcha
We are adding another CAPTCHA vendor and helping our customers migrate from Google’s reCAPTCHA to hCaptcha. Why We Are Making This Change We continuously evaluate our security measures to ensure they align with the evolving landscape of threats. After carefully…
The Do?s and Don?ts of Modern API Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Do?s and Don?ts of Modern API Security
Women Can Make a Difference in the Field of Data Science
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Women Can Make a Difference in the Field of Data Science
The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific