The cyber insurance industry in Asia is heating up, with more organizations recognizing that cyber threat can in fact have crippling consequences. How will cyber insurance prove disruptive in 2016? Forcepoint's Carl Leonard shares insight
Given the rise in cyber threats, CERT-In's existing rules of empanelling IT Security auditing organizations may not comply with the new challenges. It's time to revisit these guidelines and add stringent qualifying factors for auditing.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
Tracing bitcoin transactions, some security experts suspect multiple gangs have each amassed more than $1 billion, making them the equivalent of "unicorns" - a term venture capitalists apply to extremely successful startup firms. In case there was any doubt, cybercrime really does pay.
The Maharashtra government has appointed senior IPS officer and IT expert Brijesh Singh as Special IG-Cybercrime. Experts analyze expectations for the new head and discuss what should be his agenda for tackling cybercrime.
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
According to sources in the industry and community, organizations are regularly getting breached and held to ransom in India. What's the story, and why are these organizations choosing to remain silent about these attacks?
Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
As nations worldwide struggle with effective cyber legislation, Europe leads. Dr. Henning Wegener, chairman at World Federation Of Scientists' Permanent Monitoring Panel on InfoSec, speaks to what makes this possible.
In the coming months, the Department of Homeland Security will implement a new cyberthreat information sharing law designed to help prevent breaches. But will the Cybersecurity Act of 2015 really make a difference?
Qatar's national cybersecurity agenda is designed to ensure that security policies help businesses strike the right balance between security and economic growth, says Khalid Al Hashmi, a top official in the Ministry of Information and Communications Technology.
Adobe is warning Flash users to update their software immediately in the wake of zero-day attacks that can enable attackers to take full control of vulnerable systems. This year, Adobe has patched 316 bugs in Flash. Is it time for the plug-in to die?