Mass targeted attacks often need a big event as the pivot to grab the prospective victims' attention. Using the example such of a phishing campaign, Symantec's Narang shares insight on how low awareness impacts the region.
"Shadow IT" has long existed slightly under the radar of the enterprise IT and security organizations. The term describes business units that opt to embrace IT systems and applications, including SaaS apps, without the express consent and support of IT.
In the past, these transgressions have mainly been overlooked....
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
What are some of the challenges practitioners will face as they attempt to look at emerging technologies, including CASB? How effective is the MSSP paradigm in addressing the skills gap? Expert security practitioner Manish Dave shares insights.
As a result of high-profile breaches, emerging malware threats and increased regulatory scrutiny, CISOs at financial institutions are under more pressure than ever to develop innovative strategies for enhancing cybersecurity. And the CISO's evolving role will be a hot topic at RSA Conference 2016.
Qatar's CERT has rolled out a new information security risk management framework to help enterprises prioritize and manage InfoSec risks. Security leaders say it is critical now to provide a governance structure to support the strategy.
NPCI's UPI service, providing instant mobile fund transfer, will go live April 8. In the pilot, 29 banks will start UPI-based services using a single identifier with the norm of single-factor authentication. What challenges await CISOs?
What can Indian organizations do to get their privacy programs in gear? More important, why is privacy essential to transacting global business? AK Anand, CISO at NIIT Tech, shares practical insights, recommendations
As U.S. President Obama rolls out a cybersecurity action plan calling for a federal CISO, security experts debate whether India should follow suit and empower a new leader to head the nation's cybersecurity initiatives.
Why should CISOs not report to CIOs? And why do CISOs need more direct lines of communication with CFOs? Chris Pierson, a cybersecurity attorney and CISO who'll be a speaker at RSA Conference 2016, provides answers.
President Obama is creating a federal CISO post as part of a multifaceted initiative aimed at strengthening the nation's IT security. His plan includes forming a public-private Commission on Enhancing National Cybersecurity and boosting government cybersecurity spending by 35 percent.
The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
Three banks and a pharmaceutical company in India are reported to have been hacked by attackers who compromised IT administrators' computers using Lechiffre ransomware, demanding payment in bitcoins. How should CISOs defend against extortion?
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.