The nature of sophisticated fraud is changing, argues NPCI's Bharat Panchal. He shares experiences from his sector to support this idea, and he shares insights on how this will affect the security practitioner roles.
Collaboration, information sharing and a need to keep security discussions real and grounded are just some of the themes that were reinforced by speakers and attendees at the ISMG Data Breach and Fraud Prevention Summit in Mumbai.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
The U.S. Congress delves into the issue of whether CISOs should report to CIOs, a topic that leads the Friday, May 27, 2016, edition of the ISMG Security Report, an on-demand audio report offered every Tuesday and Friday.
After years of debate, the EU's General Data Protection Regulation has finally passed. What impact - if any - will the GDPR have on business and future legislation in India? Security experts weigh in on this debate.
Dr. Amirudin Wahab, CEO, Malaysia Cybersecurity, says organizations in the Middle East must adopt a strong public-private partnership model and build an effective information-sharing platform to create a more secure ecosystem.
Security leaders, while welcoming India's new intellectual property rights policy as a step in the right direction, argue that the policy lacks specifics around awareness creation, enforcement of IP rights and software patenting.
Cyberattacks are increasing in frequency, complexity, nuance and stealth. But human error, business compulsions and increasingly complex environments make it difficult to maintain adequate defenses, says Juniper Network's CTO for India and SAARC
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Close on the heels of the QNB leak, the same attackers have published data that appears to be from UAE-based InvestBank. The dump appears to contain payment card data, as well as a large number of sensitive, internal files relating to the bank's employees and systems.