The new barcode-based passbook printing kiosk adopted by leading banks is now said to contain security flaws that could result in data leakage. What is the vulnerability, and how can it be mitigated?
Antrix becomes the latest in a long line of government agencies that have been hacked or defaced. What lessons can be learned from this incident, and how must agencies improve their cybersecurity posture?
In global business, operating under multiple jurisdictions and regulations helps build the case for governance, risk and compliance solutions. But there is more to GRC than meets the eye, says MetricStream's French Caldwell.
The Mumbai-based SEBI has issued new guidelines to the country's stock exchanges to develop a cybersecurity and cyber resilience framework to protect the securities market from cyber-threats.
In an exclusive panel hosted by ISMG, security leaders discuss new strategies and solutions for securing the digital customer experience. Are CISOs game to tackle this evolving security challenge?
Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
With large swatches of rural India preparing to go online, new Internet users, who are using devices other than PCs, need to be educated about the risks, says cybersecurity analyst Jiten Jain, CEO of the InfoSec Consortium.
Mobile app-based ecommerce is surging forward in India's smartphone-saturated market. After Meru Cabs' data exposure earlier in May, security experts analyze legal liability, secure development & incident response.
In an application-driven economy, are security leaders paying enough attention to application-level security? OWASP's Dhruv Soi speaks on how to ensure security in the application development lifecycle.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.