In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
As the Indian economy pushes closer to realizing the promise of initiatives such as Digital India, the momentum is causing a strategic paradigm shift in the approach to cybersecurity. DSCI's Vinayak Godse shares observations.
Security experts say digital transformation demands that enterprise leaders look beyond compliance to understand business needs. This drives the need for a managed services model to understand and map enterprise risks.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
If the Chinese government hacked the U.S. Office of Personnel Management for espionage purposes, then the U.S. government's $133 million contract to provide ID theft monitoring services is a waste of money. Instead, the agency could have used the funds to safeguard its systems against future attacks.
KK Mookhey has been keyed into the field of Information Security in India for over the last 14 years. He shares his insights on the emerging trends in Indian security today and the major milestones which transformed the sector.
Security leaders must embrace new approaches to digital business in managing and mitigating enterprise risk. This was the key theme of Gartner's Security and Risk Management Summit - the first of its kind for India.
Multiple programs to incubate security skills to meet India's growing demand have not borne fruit. ISACA's Avinash Kadam weighs in on the skills crisis, speaking about the group's new CSX cybersecurity program.
The National Cyber Security Policy promotes public-private partnerships, but little progress has been made to nurture them. What are the key ingredients, and how can security leaders seed these efforts?
One security expert says the highly-publicized breach of online dating website Ashley Madison appears to include the exposure of sensitive, personal details relating to between 100,000 to 150,000 registered customers in India.