Security experts say the conclusions of an inspector general's report on how the Nuclear Regulatory Commission contracts the administration of security operation centers also applies to other government agencies and private businesses.
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
New guidance for cyber-resilience, vendor management and breach notification are expected for New York state banks in early 2016. And the tone set by these guidelines may have a ripple effect, influencing the actions of federal banking regulators.
The Reserve Bank of India is setting up an IT arm and scouting for a CEO. The leader is expected to be an IT person with skills to handle cybersecurity, IT systems audit and assessment. What qualities must this leader possess?
Vivian Poon, head of Network Security Operations at UBS, sees the need to encourage women to take up new roles in risk management, governance, security and forensics. How does she recommend recruiting these new professionals?
Indian enterprises are increasingly vulnerable to cyber fraud, according to Kroll's new Global Fraud Report. But too many of these organizations rely solely on a reactive approach to fraud, says Kroll's Reshmi Khurana.
Risk advisory firm Kroll is out with its Annual Global Fraud Report, which finds cyber risk and insider fraud rising in India. What's behind the surge, and what can organizations do to improve detection and response to all forms of fraud?
ITSERT-NP, formed to address Nepal's cybersecurity challenges, faces the task of prescribing policy guidelines and mandates, as well as establishing an information-sharing platform to secure Nepal against growing threats.
Home Minister Rajnath Singh says India is increasingly susceptible to international cyberattacks, and new barriers must be created. He also asks cybersecurity experts to be alert to online radicalization.
To adequately protect their data, organizations need to go far beyond traditional controls and implement a "data-centric security" approach, says Informatica's Robert Shields, who describes the essential elements of the strategy.
(ISC)Â² 's recent global workforce study finds the number of Infosec women as a percent in GRC roles has doubled. Female security practitioners endorse the view, saying women, by nature, are better risk managers.
A curious case of fraud has come to light at Kotak Mahindra Bank, where fraudsters misused credit cards that the bank says it never issued. What will investigations reveal about how fraudsters accessed this data? Who is liable?