New electronic payment methods lead to huge security challenges. Experts suggest initiatives including deploying standard security controls at all levels, mandatory breach disclosure, and sharing best practices to secure gateways.
Why should CISOs not report to CIOs? And why do CISOs need more direct lines of communication with CFOs? Chris Pierson, a cybersecurity attorney and CISO who'll be a speaker at RSA Conference 2016, provides answers.
President Obama is creating a federal CISO post as part of a multifaceted initiative aimed at strengthening the nation's IT security. His plan includes forming a public-private Commission on Enhancing National Cybersecurity and boosting government cybersecurity spending by 35 percent.
The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
CERT-In has inked a new cybersecurity agreement with Malaysia, Singapore and Japan to promote information sharing and threat detection. What challenges will these nations face, given their diverse cultures and priorities?
Three banks and a pharmaceutical company in India are reported to have been hacked by attackers who compromised IT administrators' computers using Lechiffre ransomware, demanding payment in bitcoins. How should CISOs defend against extortion?
Singapore plans to introduce a cybersecurity bill to protect its critical infrastructure from cyber threats and make investments in skills-building. Information security experts weigh in with their candid reactions to this emerging legislation.
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Given the rise in cyber threats, CERT-In's existing rules of empanelling IT Security auditing organizations may not comply with the new challenges. It's time to revisit these guidelines and add stringent qualifying factors for auditing.
What are the challenges when it comes to operationalizing threat intelligence feeds in the context of your business and environment? Organizations first must ensure they make best use of intelligence available internally. Arbor's Crane shares insight
The Maharashtra government has appointed senior IPS officer and IT expert Brijesh Singh as Special IG-Cybercrime. Experts analyze expectations for the new head and discuss what should be his agenda for tackling cybercrime.
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
According to sources in the industry and community, organizations are regularly getting breached and held to ransom in India. What's the story, and why are these organizations choosing to remain silent about these attacks?
Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
As nations worldwide struggle with effective cyber legislation, Europe leads. Dr. Henning Wegener, chairman at World Federation Of Scientists' Permanent Monitoring Panel on InfoSec, speaks to what makes this possible.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.