Automobiles have crash ratings. Do they need ratings for cybersecurity, too? In this interview, security expert Jacob Olcott of BitSight Technologies previews a session he'll moderate at the RSA Conference 2016 that will address this question.
NPCI's UPI service, providing instant mobile fund transfer, will go live April 8. In the pilot, 29 banks will start UPI-based services using a single identifier with the norm of single-factor authentication. What challenges await CISOs?
The Department of Homeland Security issues new guidelines to expedite the sharing of cyberthreat information between the government and businesses. See specific examples on how information sharing works.
A Hollywood hospital acknowledges paying ransom to unlock data seized by attackers. But while experts generally caution against paying extortionists, some organizations do indeed fold under the pressure to get their critical data back quickly.
What can Indian organizations do to get their privacy programs in gear? More important, why is privacy essential to transacting global business? AK Anand, CISO at NIIT Tech, shares practical insights, recommendations
Apple CEO Tim Cook has blasted a U.S. federal judge's Feb. 16 order compelling Apple to help bypass the encryption on an iPhone seized by the FBI, saying the crypto backdoor would set a "dangerous" precedent.
We hear a lot about security in regulated verticals such as financial services and telecom. But what are some of the challenges unique to manufacturing? Tata Motor's CISO Uday Deshpande shares insight and recommendations.
Multiple hospitals from Hollywood to Germany have been hit recently by ransomware attacks. It's a reminder that no organization is immune to outbreaks of malware that's designed to forcibly encrypt all data stored on PCs and servers.
The formation of a new U.K. taskforce that aims to curb financial fraud is getting mixed reviews from industry experts. Is this just a government PR move, or can the taskforce truly be effective? And could such a group have an impact in the U.S.?
Antonin Scalia's replacement could help push the Supreme Court to reinterpret the Constitution's Fourth Amendment to make it harder for the government to surveil citizens online and seize their records stored on servers maintained by cloud service providers.
As U.S. President Obama rolls out a cybersecurity action plan calling for a federal CISO, security experts debate whether India should follow suit and empower a new leader to head the nation's cybersecurity initiatives.
Warning: Too many voice over IP devices being used in enterprise environments have well-known default passwords or no security at all, thus leaving organizations at risk from covert surveillance and toll-fraud scammers, experts say.
The U.S. and U.K. government push to "backdoor" strong crypto - used to secure everything from online banking and e-commerce to patient health records and consumer communications - wouldn't stop most criminals or terrorists, researchers warn.
Federal regulators have issued new guidance to clarify scenarios where HIPAA privacy and security regulation might apply, including for mobile health applications and electronic data exchange. Why are some organizations still so confused?