An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The Reserve Bank of India plans to set up an IT subsidiary to help banks strengthen cybersecurity. Banking and security leaders say this is a positive move toward responding to cybercrime trends.
Veteran Java bug hunter Adam Gowdiak has disclosed details of what he says are unpatched flaws in Google App Engine for Java and criticized the company for its response.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than...
The public demands accountability for data breaches involving government systems and expects that all government entities have the same levels of security that Fortune 500 companies do. However, most government organizations have fewer IT security resources than their larger enterprise counterparts, yet they face the...
The public demands accountability for data breaches involving private healthcare information and expects that all healthcare institutions will have the same levels of security that Fortune 500 companies do. However, most healthcare organizations have fewer IT security resources than their enterprise counterparts, yet...
Security leaders see the need for a formal information-sharing platform across India to enable organizations in all sectors to defend against attacks. What are the barriers, and how can they be overcome?
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Former RSA Chairman Art Coviello has re-emerged as a partner with venture capital firm Rally Ventures. What's it like to transition from creating new security solutions to discovering and nurturing them?
Wanted: Hackers for hire. Or in British government parlance: "Committed and responsible individuals who have the potential to carry out computer network operations to keep the U.K. safe." Ready to apply?
The FBI is offering a big-stakes reward for an alleged criminal who ranks at the top of its "cyber most wanted" list. But one cybercrime expert asks: "Would you cross the Russian mafia or some organized crime gang for $3 million?"
Experts from the Middle East and Asia say "smart cities" must be built over a secure ecosystem from the design stage, inclusive of people, policies, procedures and structure. Are CISOs ready for the challenge?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.