The National Internet Exchange of India, an autonomous body under the Ministry of Electronics and IT that maintains the .In registry and country code Top Level Domains, has switched to a new outsourcer for operations and maintenance. Some security experts are criticizing the move.
Organizations may have great cybersecurity intentions, but translating those desires into a robust security reality is often challenging, says Ratinder Ahuja, CEO of ShieldX Networks. That's why he advocates automation to ensure intention equals reality.
Machine learning systems adapt their behavior on the basis of a feedback loop, so they can overlearn and develop blind spots, which if not understood by practitioners can lead to dangerous situations, says Sam Curry of Cybereason.
Automation is the first step toward full-blown machine learning and artificial intelligence. But unfortunately, automation already is being weaponized for malicious purposes, says Fortinet's Derek Manky.
In a keynote address at the RSA Conference 2019, RSA President Rohit Ghai encouraged attendees to work in the coming years to "implement a security program with machines and humans working together. Humans asking questions; machines hunting answers."
Indian hackers recently defaced more than 200 Pakistani websites, apparently in retaliation for a suicide bomber, allegedly from Pakistan, killing 40 Indian soldiers on Feb. 14. Now the Indian hacking community must work with the government to prepare for a possible retaliatory cyberattack from Pakistan.
As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.
Security practitioners should strive to offer their organizations "frictionless" security that's truly a business enabler, says Sridhar Govardhan, newly appointed CISO of Wipro Ltd., a Bengaluru-based company offering information technology, consulting and business process services.
For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods...