Despite new guidance issued earlier this year, insurance companies in India are still falling short of meeting security standards, according to a notification from the Insurance Regulatory and Development Authority of India. Some security experts say one of the key challenges is finding a CISO.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
MeitY has announced it will give preferential treatment to locally developed security solutions for use throughout the government at the center and state levels. Private sector security practitioners weigh in on whether it's practical for them to make a similar shift.
With the volume of digital payment transactions in Asia growing at an unprecedented rate, educating consumers about digital hygiene is more important than using the right security technologies, says Mohan Veloo, CTO for APAC at F5 Networks.
Developing safe and effective information sharing practices to foster greater interoperability presents big challenges. As information sharing becomes increasingly vital in building resilient cybersecurity, the need to put a strong, collaborative structure in place is critical.
Although there are many options for...
The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
Security researchers have discovered websites run by credit bureaus Equifax and TransUnion were both affected by dodgy code that redirected users to adware and malware. Both issues are fixed, but the situations beg questions about how closely the companies monitor their online security.
It's a tale that reads stranger than fiction, a true Tom Clancy-ish yarn: Israeli spies hacked Kaspersky Lab, discovering that Russia has been using the company's pervasive anti-virus software to spy on U.S. spies. Will Kaspersky Lab survive?
North Korea's leaders apparently blew a gasket over "The Interview," a comedy film that centered on an assassination plot against North Korea's leader. So how might the country have reacted to U.S.-South Korean "decapitation strike" plans reportedly stole last year by Pyongyang-affiliated hackers?
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
The Dark Overlord, a hacking group that hijacks data from businesses and holds it for ransom, is now threatening school districts. The apparent intent isn't to get ransoms from schools per se, but to create a fear campaign designed to scare big businesses into paying the group's ransoms.
The growing use of mobile devices is changing the security landscape, and protection must extend to the device, the application, the connection channel and the network entry point, says Bimal Gandhi, CEO at Uniken Inc.
Researchers claim to have discovered information from 6,000 Indian enterprises, including governmental units, for sale on the dark net. But while the National Internet Exchange of India, the apparent source of the information, is attempting to downplay the incident, others are demanding a clear explanation.
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
CISOs need to anticipate the important questions their CEO is likely to ask as mega-breaches make headlines and data security is in the spotlight. Here, security leaders offer insights on how to answer eight tough questions.