ISMG's upcoming Data Breach Summit Asia in Bangalore will provide insights from industry thought-leaders on the best defense strategies for tackling future breaches. In the face of increasing targeted attacks, cyber extortion and the growing threat to critical infrastructure, there is plenty to discuss, debate and...
Dr. Sanjay Bahl has been appointed director general of CERT-In, according to inside sources. Security practitioners welcome the move and expect to see a new agenda and thrust on effective public private partnership.
Email security is a growing worry, despite the fact that phishing attacks and spam have been around for decades, says Vidur Apparao, CTO of Agari. In this video interview, he explains why DMARC is gaining ground as a viable way to shore up email defenses.
Because of growing cybersecurity concerns, CISOs in the financial sector finally are getting more time with their boards of directors and more direct interaction with senior executives, says John Carlson, chief of staff at the Financial Services Information Sharing and Analysis Center.
Automated threat intelligence sharing can significantly reduce the amount of time it takes organizations to identify, assess and react to attacks, according to new research from Johns Hopkins. Mark Clancy, CEO of Soltra, says automated information sharing with government and other sectors is catching on.
The nonstop pace of "Apple vs. FBI" updates and related crypto debates seemed to exceed both the U.S. government's and the information security industry's advanced persistent spin-cycles at this year's RSA Conference.
nullcon has made a name for itself with its forward-looking philosophy - "The Next Security Thing!" We take a look at some of the hot sessions and events slated to take place at the security marathon this year.
Mass targeted attacks often need a big event as the pivot to grab the prospective victims' attention. Using the example such of a phishing campaign, Symantec's Narang shares insight on how low awareness impacts the region.
"Shadow IT" has long existed slightly under the radar of the enterprise IT and security organizations. The term describes business units that opt to embrace IT systems and applications, including SaaS apps, without the express consent and support of IT.
In the past, these transgressions have mainly been overlooked....
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
What are some of the challenges practitioners will face as they attempt to look at emerging technologies, including CASB? How effective is the MSSP paradigm in addressing the skills gap? Expert security practitioner Manish Dave shares insights.
Financial services firms and healthcare institutions have been at the forefront of adopting encrypted email, simply because so much vital and sensitive information today naturally flows via email, Dave Wagner, CEO of ZixCorp, says in this video interview.
It's springtime in San Francisco: cue the annual RSA Conference. Here are some notable trends that have already emerged from the event, ranging from ransomware and phishing attacks to hacker self-promotion and Facebook fakery.
The Government of India will partner with the Maharashtra Police to train cybersecurity professionals to tackle cybercrime. NIELIT will take up the task of imparting cybersecurity and forensic training to nearly 60,000 personnel.
The cyberattacks that we've seen in the healthcare sector over the past year are starting to rewrite the rules for healthcare-related businesses in a way we really haven't seen before. How are you upping your game?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.