To the list of vulnerable, Internet-connected devices - from routers and home alarms to baby monitors and toys - now add the world's most popular electric car: the Nissan LEAF. Nissan says a full fix is forthcoming.
As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?
As a result of high-profile breaches, emerging malware threats and increased regulatory scrutiny, CISOs at financial institutions are under more pressure than ever to develop innovative strategies for enhancing cybersecurity. And the CISO's evolving role will be a hot topic at RSA Conference 2016.
Qatar's CERT has rolled out a new information security risk management framework to help enterprises prioritize and manage InfoSec risks. Security leaders say it is critical now to provide a governance structure to support the strategy.
NPCI's UPI service, providing instant mobile fund transfer, will go live April 8. In the pilot, 29 banks will start UPI-based services using a single identifier with the norm of single-factor authentication. What challenges await CISOs?
The Department of Homeland Security issues new guidelines to expedite the sharing of cyberthreat information between the government and businesses. See specific examples on how information sharing works.
A Hollywood hospital acknowledges paying ransom to unlock data seized by attackers. But while experts generally caution against paying extortionists, some organizations do indeed fold under the pressure to get their critical data back quickly.
What can Indian organizations do to get their privacy programs in gear? More important, why is privacy essential to transacting global business? AK Anand, CISO at NIIT Tech, shares practical insights, recommendations
We hear a lot about security in regulated verticals such as financial services and telecom. But what are some of the challenges unique to manufacturing? Tata Motor's CISO Uday Deshpande shares insight and recommendations.
Multiple hospitals from Hollywood to Germany have been hit recently by ransomware attacks. It's a reminder that no organization is immune to outbreaks of malware that's designed to forcibly encrypt all data stored on PCs and servers.
Antonin Scalia's replacement could help push the Supreme Court to reinterpret the Constitution's Fourth Amendment to make it harder for the government to surveil citizens online and seize their records stored on servers maintained by cloud service providers.
As U.S. President Obama rolls out a cybersecurity action plan calling for a federal CISO, security experts debate whether India should follow suit and empower a new leader to head the nation's cybersecurity initiatives.
Warning: Too many voice over IP devices being used in enterprise environments have well-known default passwords or no security at all, thus leaving organizations at risk from covert surveillance and toll-fraud scammers, experts say.
Federal regulators have issued new guidance to clarify scenarios where HIPAA privacy and security regulation might apply, including for mobile health applications and electronic data exchange. Why are some organizations still so confused?