Beyond APT30, another advanced threat group appears to be at work in India and the SEA region, targeting critical information assets. However, APT resiliency is not yet a part of the security lexicon, experts say.
The National Cyber Security Policy promotes public-private partnerships, but little progress has been made to nurture them. What are the key ingredients, and how can security leaders seed these efforts?
One security expert says the highly-publicized breach of online dating website Ashley Madison appears to include the exposure of sensitive, personal details relating to between 100,000 to 150,000 registered customers in India.
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
In the wake of the APT30 report's revelations, FireEye's Ranndeep Chonker talks about the Indian government's approach to information security and its primary challenges in dealing with APT types of attacks.
The Telangana government is taking steps to address the state's cybersecurity skills shortage. See its emerging plans to align with academia and industry bodies to build partnerships and new capacities.
As a report surfaced that Chinese spies read the private emails of top Obama administration officials, the Pentagon revealed it had restored the unclassified email network used by the Joint Chiefs of Staff, brought down two weeks ago following a purported Russian breach.
A $46.7 million fraud scheme that hit Ubiquiti Networks Inc. shows the new & improved face of wire fraud - and just how easy it is for cybercriminals to fool employees into helping to pilfer their own enterprises.
Given that hacking is an everyday threat to most organizations, reliable security depends on understanding the exposure, weaknesses and threats that could lead to a breach in the defences, says PWC's Wouter Veugelen.
What does an organization do when it cannot afford to fund a full-time C-level security leader? Enter the virtual CISO, a growing service offering in India. Experts discuss the business value and benefits.
After hosting the ISACA Mumbai Chapter Conference back in 2013, I was asked again this year, and didn't think twice. Here are some of my observations from two days of talking security with key thought-leaders.
An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.