Are you making the most of all the intelligence available to you today? What are the practical aspects of plugging abstract threat intelligence into your specific business use cases? Deloitte's Parthasarathy shares deeper insight.
Even with the exponential increase in what technology can achieve in fighting security threats and fraud, a recent discussion with practitioners suggests that insider risk remains the biggest issue giving practitioners sleepless nights.
Two public sector banks recently were victims of data breaches. Experts shed more light on the possible vulnerabilities that banks and their customers have left unaddressed, and make recommendations to prevent future attacks.
A new study says India needs $4 billion via public-private partnership to address cybercrime challenges. Security and law enforcement experts emphasize the need for a pragmatic approach to tackle new age cybercrime.
Many APAC security practitioners have a better understanding of the big picture issues in security and new paradigms than do their counterparts in Europe, says Maurizio Garavello, VP APAC at Forcepoint.
Each year the skills gap estimate for cybersecurity goes up, with few concerted, industry-wide efforts to address the issue. What organizations in all sectors truly need is hands-on, up-to-date, intensive training, says NIELIT MD Dr. Ashwini Sharma.
SEBI urges commodity derivatives exchanges to put resilient cybersecurity defences in place to protect themselves from growing attacks. Security leaders say such mandates will compel senior management to increase focus on cybersecurity.
Ahmed Baig, founder of the CISO Council of UAE, says security leadership via fear, uncertainty and doubt is a thing of the past. In fact, future CISOs who use those tactics might find themselves ostracized and doomed to fail.
The Indian restaurant rating website Burrp was one of the recent targets for ransomware. With such incidents predicted to see a surge, experts put forth strategies to defend against ransomware and share lessons on how to minimize risks.
Even as cloud, virtualized environments and mobility continue to make the technology landscape within the enterprise more complex, it's getting harder for organizations to maintain perspective and visibility of all the pieces, says Skybox Security's EVP Stewart Fox.
A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?
Security leaders discuss the cyber-threat challenges facing India's critical infrastructure, including energy, manufacturing, defense and transportation. What new strategies, solutions and best practices do they suggest to respond to emerging threats?
Despite the recent move to put the FBI-obtained court order against Apple on hold, the crypto debate is far from over, said a panel of law enforcement, legal and industry experts at Information Security Media Group's Fraud and Breach Prevention Summit in San Francisco.
Neither the FBI nor Apple looks good in the days following the postponement of a hearing on whether Apple should be forced to help the bureau crack open the iPhone of one of the San Bernardino shooters. The FBI's credibility is being questioned as Apple's security technology is being tarnished.
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.