Privacy can be a true game changer for Indian enterprises in 2016. But to get there, then privacy practitioners and leaders must help ensure discussion evolves into how privacy can help organizations drive business growth.
Given the rise in cyber threats, CERT-In's existing rules of empanelling IT Security auditing organizations may not comply with the new challenges. It's time to revisit these guidelines and add stringent qualifying factors for auditing.
Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
As banking embraces emerging technologies, security leaders face increased cyber-risks. But they can leverage this three-step prevention, detection and response framework for simplified security management.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.