One of the many concerns with the draft data protection bill is the lack of power granted to the data protection authority, says Prasanth Sugathan, legal director at Software Freedom Law Center, a non-profit organisation based in New Delhi that promotes innovation and open access to knowledge.
Leading the latest edition of the ISMG Security Report: Microsoft's Joram Borenstein highlights his top three areas of focus for 2019. Plus, Randy Vanderhoof of the US Payments Forum on securing card transactions in the coming year.
Managed security services providers are playing an important role in helping organizations cope with hiring challenges and meet regulatory compliance requirements, says Kartik Shahani, director of channels for APJ at RSA.
Efforts to protect privacy must be carefully balanced against the need to practically implement advanced technologies, argues Jared Ragland, senior director for policy in APAC at BSA/The Software Alliance, an advocacy group for software companies.
Account takeover is a rapidly growing arena for cybercriminals. How can organizations strengthen both authentication and authorization? Scott Olson of iovation, a TransUnion Company shares his insights.
Will the newly introduced Data Care Act prove to be a viable U.S. equivalent to the EU's General Data Protection Regulation, or is it destined to fail? An analysis leads this edition of the ISMG Security Report, which also features reports on robotic process automation and Mastercard's "fusion center."
DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings.
The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity."
Ganesh Viswanathan, CISO at Quatrro, a global services company, offers insights on how to avoid incident response mistakes. One key element, he says, is using multiple sources for breach detection so response can be swift.